Publication | Date of Publication | Type |
---|
https://portal.mardi4nfdi.de/entity/Q6148632 | 2024-02-07 | Paper |
FINAL: faster FHE instantiated with NTRU and LWE | 2023-08-16 | Paper |
Scooby: improved multi-party homomorphic secret sharing based on FHE | 2023-07-25 | Paper |
Gladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed Decryption | 2023-05-26 | Paper |
Kicking-the-bucket: fast privacy-preserving trading using buckets | 2023-05-26 | Paper |
Generic forward-secure key agreement without signatures | 2022-11-02 | Paper |
Sashimi: Cutting up CSI-FiSh Secret Keys to Produce an Actively Secure Distributed Signing Protocol | 2022-10-13 | Paper |
Tightly secure ring-LWE based key encapsulation with short ciphertexts | 2022-08-25 | Paper |
Multi-rate threshold FlipThem | 2022-08-25 | Paper |
Private liquidity matching using MPC | 2022-07-06 | Paper |
Optimizing registration based encryption | 2022-06-29 | Paper |
The cost of IEEE arithmetic in secure computation | 2022-06-15 | Paper |
History of Cryptographic Key Sizes | 2022-02-25 | Paper |
Actively secure setup for SPDZ | 2022-01-26 | Paper |
Round-optimal verifiable oblivious pseudorandom functions from ideal lattices | 2021-12-21 | Paper |
Secure fast evaluation of iterative methods: with an application to secure PageRank | 2021-12-20 | Paper |
Compilation of function representations for secure computing paradigms | 2021-12-20 | Paper |
Large scale, actively secure computation from LPN and free-XOR garbled circuits | 2021-12-08 | Paper |
High-performance multi-party computation for binary circuits based on oblivious transfer | 2021-08-10 | Paper |
Faster Homomorphic Evaluation of Discrete Fourier Transforms | 2021-03-17 | Paper |
Overdrive2k: efficient secure MPC over \(\mathbb{Z}_{2^k}\) from somewhat homomorphic encryption | 2020-08-05 | Paper |
Using TopGear in overdrive: a more efficient ZKPoK for SPDZ | 2020-07-21 | Paper |
BBQ: using AES in Picnic signatures | 2020-07-21 | Paper |
Adding distributed decryption and key generation to a ring-LWE based CCA encryption scheme | 2020-05-27 | Paper |
Sharing the LUOV: threshold post-quantum signatures | 2020-05-06 | Paper |
Distributing any elliptic curve based protocol | 2020-05-06 | Paper |
Benchmarking privacy preserving scientific operations | 2020-01-30 | Paper |
Error detection in monotone span programs with application to communication-efficient multi-party computation | 2020-01-28 | Paper |
EPIC: efficient private image classification (or: learning from the masters) | 2020-01-28 | Paper |
Efficient constant-round multi-party computation combining BMR and SPDZ | 2019-08-13 | Paper |
Reducing communication channels in MPC | 2018-10-17 | Paper |
CAPA: the spirit of beaver against physical attacks | 2018-09-12 | Paper |
When it's all just too much: outsourcing MPC-preprocessing | 2018-04-20 | Paper |
Fixed-point arithmetic in SHE schemes | 2018-02-16 | Paper |
More Efficient Constant-Round Multi-party Computation from BMR and SHE | 2016-12-21 | Paper |
Linear Overhead Optimally-Resilient Robust MPC Using Preprocessing | 2016-10-21 | Paper |
Which Ring Based Somewhat Homomorphic Encryption Scheme is Best? | 2016-04-08 | Paper |
Just a Little Bit More | 2016-03-02 | Paper |
Cryptography made simple | 2016-02-09 | Paper |
Threshold FlipThem: When the Winner Does Not Need to Take All | 2015-12-11 | Paper |
Efficient Constant Round Multi-party Computation Combining BMR and SPDZ | 2015-12-10 | Paper |
Bootstrapping BGV Ciphertexts with a Wider Choice of $$p$$ and $$q$$ | 2015-08-27 | Paper |
“Ooh Aah... Just a Little Bit” : A Small Amount of Side Channel Can Go a Long Way | 2015-07-21 | Paper |
Actively Secure Private Function Evaluation | 2015-01-06 | Paper |
Practical Covertly Secure MPC for Dishonest Majority – Or: Breaking the SPDZ Limits | 2014-10-16 | Paper |
Reducing the Overhead of MPC over a Large Population | 2014-10-14 | Paper |
Using the Cloud to Determine Key Strengths | 2014-08-20 | Paper |
Dishonest Majority Multi-Party Computation for Binary Circuits | 2014-08-07 | Paper |
What is computer science? An information security perspective | 2014-04-01 | Paper |
Fully homomorphic SIMD operations | 2014-03-17 | Paper |
Estimating Key Sizes for High Dimensional Lattice-Based Systems | 2014-01-17 | Paper |
Between a Rock and a Hard Place: Interpolating between MPC and FHE | 2013-12-10 | Paper |
The Low-Call Diet: Authenticated Encryption for Call Counting HSM Users | 2013-03-18 | Paper |
Ring Switching in BGV-Style Homomorphic Encryption | 2012-09-25 | Paper |
Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol | 2012-09-25 | Paper |
Multiparty Computation from Somewhat Homomorphic Encryption | 2012-09-25 | Paper |
Homomorphic Evaluation of the AES Circuit | 2012-09-25 | Paper |
Better Bootstrapping in Fully Homomorphic Encryption | 2012-07-20 | Paper |
Fully Homomorphic Encryption with Polylog Overhead | 2012-06-29 | Paper |
On CCA-Secure Somewhat Homomorphic Encryption | 2012-06-08 | Paper |
On the Joint Security of Encryption and Signature in EMV | 2012-06-08 | Paper |
Improved Key Generation for Gentry’s Fully Homomorphic Encryption Scheme | 2011-12-16 | Paper |
Secure Outsourced Computation | 2011-06-29 | Paper |
Wildcarded identity-based encryption | 2011-04-01 | Paper |
Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement | 2010-11-26 | Paper |
The Fiat–Shamir Transform for Group and Ring Signature Schemes | 2010-09-10 | Paper |
Get Shorty via Group Signatures without Encryption | 2010-09-10 | Paper |
Identity-based authenticated key agreement protocol based on Weil pairing | 2010-07-10 | Paper |
Groth–Sahai Proofs Revisited | 2010-05-28 | Paper |
Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes | 2010-05-28 | Paper |
Errors Matter: Breaking RSA-Based PIN Encryption with Thirty Ciphertext Validity Queries | 2010-03-16 | Paper |
An Analysis of Goubin’s Refined Power Analysis Attack | 2010-03-09 | Paper |
The TLS handshake protocol: A modular analysis | 2010-03-01 | Paper |
Analysis of the Insecurity of ECMQV with Partially Known Nonces | 2010-02-09 | Paper |
Distributing the Key Distribution Centre in Sakai–Kasahara Based Systems | 2010-01-07 | Paper |
Practical Zero-Knowledge Proofs for Circuit Evaluation | 2010-01-07 | Paper |
Secure Two-Party Computation Is Practical | 2009-12-15 | Paper |
Security Notions and Generic Constructions for Client Puzzles | 2009-12-15 | Paper |
Identity Based Group Signatures from Hierarchical Identity-Based Encryption | 2009-08-18 | Paper |
Hash function requirements for Schnorr signatures | 2009-06-12 | Paper |
Pairings for cryptographers | 2009-03-04 | Paper |
A Modular Security Analysis of the TLS Handshake Protocol | 2009-02-10 | Paper |
Pairings in Trusted Computing | 2009-02-10 | Paper |
On Proofs of Security for DAA Schemes | 2009-01-27 | Paper |
The Eta Pairing Revisited | 2008-12-21 | Paper |
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries | 2008-11-20 | Paper |
Generic constructions of identity-based and certificateless kEMs | 2008-05-06 | Paper |
Efficient KEMs with Partial Message Recovery | 2008-03-07 | Paper |
Efficient 15,360-bit RSA Using Woop-Optimised Montgomery Arithmetic | 2008-03-07 | Paper |
Toward Acceleration of RSA Using 3D Graphics Hardware | 2008-03-07 | Paper |
Cryptography and Coding | 2007-11-28 | Paper |
Cryptography and Coding | 2007-11-28 | Paper |
Advances in Cryptology - EUROCRYPT 2004 | 2007-09-25 | Paper |
A multidimensional continued fraction based on a high-order recurrence relation | 2007-09-13 | Paper |
Identity-Based Encryption Gone Wild | 2007-09-11 | Paper |
Identity-Based Traitor Tracing | 2007-09-04 | Paper |
The Number Field Sieve in the Medium Prime Case | 2007-09-04 | Paper |
Algorithmic Number Theory | 2007-05-02 | Paper |
On computable isomorphisms in efficient asymmetric pairing-based systems | 2007-03-08 | Paper |
A comparison of MNT curves and supersingular curves | 2007-01-24 | Paper |
Cryptography and Coding | 2006-11-01 | Paper |
Escrow-free encryption supporting cryptographic workflow | 2006-10-13 | Paper |
Security in Communication Networks | 2006-10-10 | Paper |
Security in Communication Networks | 2006-10-10 | Paper |
Cryptographic Hardware and Embedded Systems - CHES 2004 | 2005-08-23 | Paper |
Algorithmic Number Theory | 2005-08-12 | Paper |
Security of signature schemes in a multi-user setting | 2005-01-17 | Paper |
Software Implementation of Finite Fields of Characteristic Three, for Use in Pairing-based Cryptosystems | 2004-11-18 | Paper |
The Equivalence between the DHP and DLP for Elliptic Curves Used in Practical Applications | 2004-11-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q4737234 | 2004-08-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4736431 | 2004-08-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q4797388 | 2003-10-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q4425740 | 2003-09-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4418530 | 2003-08-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q4413849 | 2003-07-21 | Paper |
Point multiplication on ordinary elliptic curves over fields of characteristic three | 2003-07-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q4409112 | 2003-06-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q4408453 | 2003-06-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4797783 | 2003-03-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q4797814 | 2003-03-09 | Paper |
Public key signatures in the multi-user setting. | 2003-01-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q3149717 | 2002-09-26 | Paper |
The Exact Security of ECIES in the Generic Group Model | 2002-08-21 | Paper |
A note on the \(x\)-coordinate of points on an elliptic curve in characteristic two | 2002-07-25 | Paper |
Constructive and destructive facets of Weil descent on elliptic curves | 2002-05-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q2778838 | 2002-03-21 | Paper |
Arithmetic on superelliptic curves | 2001-12-10 | Paper |
A comparison of different finite fields for elliptic curve cryptosystems | 2001-11-12 | Paper |
Lattice attacks on digital signature schemes | 2001-11-04 | Paper |
The discrete logarithm problem on elliptic curves of trace one | 2001-06-24 | Paper |
Computing the $p$-Selmer group of an elliptic curve | 2000-10-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q4250782 | 2000-06-19 | Paper |
Elliptic curve cryptosystems over small fields of odd characteristic | 2000-06-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q4945368 | 2000-03-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q4265362 | 1999-10-11 | Paper |
Determining the small solutions to 𝑆-unit equations | 1999-08-31 | Paper |
p-adic Chaos and Random Number Generation | 1999-08-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q3840193 | 1999-01-06 | Paper |
A fast Diffie-Hellman protocol in genus 2 | 1999-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4375625 | 1998-10-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4210105 | 1998-09-21 | Paper |
Thue and Thue-Mahler Equations over Rings of Integers | 1998-07-11 | Paper |
Exceptional units in a family of quartic number fields | 1998-03-24 | Paper |
On the complexity of computing the 2-Selmer group of an elliptic curve | 1998-02-02 | Paper |
S -Unit Equations, Binary Forms and Curves of Genus 2 | 1997-12-08 | Paper |
Integral points on elliptic curves over number fields | 1997-11-16 | Paper |
Solving discriminant form equations via unit equations | 1997-08-10 | Paper |
Canonical heights on the Jacobians of curves of genus 2 and the infinite descent | 1997-07-29 | Paper |
Explicit 4-descents on an elliptic curve | 1997-04-23 | Paper |
Corrigenda | 1996-06-23 | Paper |
The Solution of Triangularly Connected Decomposable Form Equations | 1996-02-18 | Paper |
S-integral points on elliptic curves | 1995-08-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q4294175 | 1995-02-13 | Paper |
Curves of genus 2 with good reduction away from 2 with a rational Weierstrass point | 1995-02-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q4294196 | 1994-05-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q4034510 | 1993-05-16 | Paper |