Mark Manulis

From MaRDI portal
(Redirected from Person:843363)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Fully homomorphic encryption beyond IND-CCA1 security: integrity through verifiability2024-11-12Paper
Generalised asynchronous remote key generation for pairing-based cryptosystems2023-11-09Paper
Hierarchical Attribute-Based Signatures
Cryptology and Network Security
2023-06-28Paper
Revocable hierarchical attribute-based signatures from lattices2022-11-09Paper
Biometric-authenticated searchable encryption2021-02-23Paper
Hierarchical attribute-based signatures: short keys and optimal signature length2020-01-30Paper
Blind password registration for two-server password authenticated key exchange and secret sharing protocols2018-10-18Paper
Universally composable two-server PAKE2018-10-18Paper
Oblivious PAKE: efficient handling of password trials2018-10-18Paper
Distributed smooth projective hashing and its application to two-server password authenticated key exchange
Applied Cryptography and Network Security
2014-07-07Paper
Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt”
Information Security and Privacy
2013-06-28Paper
Forward-secure hierarchical predicate encryption
Pairing-Based Cryptography – Pairing 2012
2013-04-04Paper
Publicly verifiable ciphertexts
Lecture Notes in Computer Science
2012-09-25Paper
Fully private revocable predicate encryption
Information Security and Privacy
2012-09-07Paper
Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange
Information Security and Privacy
2012-09-07Paper
Non-interactive and re-usable universally composable string commitments with adaptive security
Lecture Notes in Computer Science
2011-12-02Paper
Affiliation-hiding authentication with minimal bandwidth consumption
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication
2011-10-14Paper
Private discovery of common social contacts
Applied Cryptography and Network Security
2011-06-28Paper
Taming Big Brother Ambitions: More Privacy for Secret Handshakes
Privacy Enhancing Technologies
2010-08-10Paper
Generic one round group key exchange in the standard model
Information, Security and Cryptology – ICISC 2009
2010-07-16Paper
Modeling leakage of ephemeral secrets in tripartite/group key exchange
Information, Security and Cryptology – ICISC 2009
2010-07-16Paper
Redactable signatures for tree-structured data: definitions and constructions
Applied Cryptography and Network Security
2010-07-06Paper
Privacy-preserving group discovery with linear complexity
Applied Cryptography and Network Security
2010-07-06Paper
Affiliation-hiding key exchange with untrusted group authorities
Applied Cryptography and Network Security
2010-07-06Paper
Confidential Signatures and Deterministic Signcryption
Public Key Cryptography – PKC 2010
2010-05-28Paper
Public-key encryption with non-interactive opening: new constructions and stronger definitions
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Flexible group key exchange with on-demand computation of subgroup keys
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Fully Robust Tree-Diffie-Hellman Group Key Exchange
Cryptology and Network Security
2009-11-26Paper
User-aware provably secure protocols for browser-based mutual authentication
International Journal of Applied Cryptography
2009-10-12Paper
Securing group key exchange against strong corruptions and key registration attacks
International Journal of Applied Cryptography
2009-02-24Paper
Universally Composable Security Analysis of TLS
Provable Security
2009-01-27Paper
Property-Based Attestation without a Trusted Third Party
Lecture Notes in Computer Science
2008-11-20Paper
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy
Information Security and Privacy
2008-07-08Paper
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting
Financial Cryptography and Data Security
2008-03-07Paper


Research outcomes over time


This page was built for person: Mark Manulis