Ron Steinfeld

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Loquat: a SNARK-friendly post-quantum signature based on the Legendre PRF with applications in ring and aggregate signatures
 
2024-12-04Paper
\textsf{Plover}: masking-friendly hash-and-sign lattice signatures
 
2024-11-13Paper
An injectivity analysis of Crystals-Kyber and implications on quantum security
Information Security and Privacy
2023-07-26Paper
Incremental symmetric puncturable encryption with support for unbounded number of punctures
Designs, Codes and Cryptography
2023-04-12Paper
A Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third Parties
Information Security Practice and Experience
2022-12-09Paper
Post-quantum ID-based ring signatures from symmetric-key primitives
 
2022-11-09Paper
Revocable and linkable ring signature
Information Security and Cryptology
2022-10-14Paper
COSAC: COmpact and Scalable Arbitrary-Centered Discrete Gaussian Sampling over Integers
Post-Quantum Cryptography
2022-10-13Paper
Public-key puncturable encryption: modular and compact constructions
Lecture Notes in Computer Science
2022-10-13Paper
DGM: a \underline{D}ynamic and revocable \underline{G}roup \underline{M}erkle signature
 
2022-08-25Paper
Generic multi-keyword ranked search on encrypted cloud data
 
2022-08-25Paper
An efficient non-interactive multi-client searchable encryption with support for Boolean queries
 
2022-08-19Paper
Vandermonde meets Regev: public key encryption schemes based on partial Vandermonde problems
Designs, Codes and Cryptography
2022-08-04Paper
Efficient Verifiable Partially-Decryptable Commitments from Lattices and Applications
Public-Key Cryptography – PKC 2022
2022-07-08Paper
FPPW: a fair and privacy preserving watchtower for bitcoin
 
2022-06-22Paper
Practical post-quantum few-time verifiable random function with applications to Algorand
 
2022-06-22Paper
Efficient lattice-based polynomial evaluation and batch ZK arguments
 
2022-03-25Paper
On the integer polynomial learning with errors problem
 
2021-12-21Paper
Measure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA security
 
2021-12-01Paper
MPSign: a signature from small-secret middle-product learning with errors
 
2021-12-01Paper
Lattice-based zero-knowledge arguments for additive and multiplicative relations
Designs, Codes and Cryptography
2021-05-10Paper
Senarai: a sustainable public blockchain-based permanent storage protocol
Cryptology and Network Security
2020-07-20Paper
Lattice RingCT v2.0 with multiple input and multiple output wallets
 
2020-05-27Paper
Risk of asynchronous protocol update: attacks to Monero protocols
 
2020-05-27Paper
Lattice-based zero-knowledge proofs: new techniques for shorter and faster constructions and applications
 
2020-05-20Paper
Short lattice-based one-out-of-many proofs and applications to ring signatures
 
2020-01-30Paper
FACCT: FAst, Compact, and Constant-Time Discrete Gaussian Sampler over Integers
IEEE Transactions on Computers
2020-01-28Paper
Practical \(\mathsf{MP} \text{- }\mathsf{LWE}\)-based encryption balancing security-risk versus efficiency
Designs, Codes and Cryptography
2019-11-07Paper
Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (lattice ringct v1.0)
 
2018-09-26Paper
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance
Journal of Cryptology
2018-05-28Paper
Hardness of \(k\)-LWE and applications in traitor tracing
Algorithmica
2018-01-05Paper
All-but-many lossy trapdoor functions and selective opening chosen-ciphertext security from LWE
 
2017-10-27Paper
Middle-product Learning with Errors
 
2017-10-27Paper
Multi-user cloud-based secure keyword search
 
2017-08-25Paper
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
Rotational cryptanalysis of ARX revisited
Fast Software Encryption
2015-09-18Paper
A subexponential construction of graph coloring for multiparty computation
Journal of Mathematical Cryptology
2015-01-22Paper
Hardness of \(k\)-LWE and applications in traitor tracing
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Practical attack on NLM-MAC scheme
Information Processing Letters
2014-06-23Paper
GGHLite: more efficient multilinear maps from ideal lattices
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Lattice-based completely non-malleable public-key encryption in the standard model
Designs, Codes and Cryptography
2014-04-29Paper
Security analysis of linearly filtered NLFSRs
Journal of Mathematical Cryptology
2014-01-23Paper
Cryptanalysis of WG-7: a lightweight stream cipher
Cryptography and Communications
2013-06-24Paper
Graph coloring applied to secure computation in non-abelian groups
Journal of Cryptology
2013-01-04Paper
Active security in multiparty computation over black-box groups
Lecture Notes in Computer Science
2012-09-25Paper
NTRUCCA: how to strengthen NTRUEncrypt to chosen-ciphertext security in the standard model
Public Key Cryptography – PKC 2012
2012-07-20Paper
On the modular inversion hidden number problem
Journal of Symbolic Computation
2012-05-04Paper
Multi-party computation with conversion of secret sharing
Designs, Codes and Cryptography
2012-03-01Paper
Known and Chosen Key Differential Distinguishers for Block Ciphers
Information Security and Cryptology - ICISC 2010
2011-10-27Paper
Lattice-Based Completely Non-malleable PKE in the Standard Model (Poster)
Information Security and Privacy
2011-07-07Paper
Making NTRU as secure as worst-case problems over ideal lattices
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
Security for Signcryption: The Multi-User Model
Practical Signcryption
2011-05-18Paper
Faster fully homomorphic encryption
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
Universal designated-verifier signatures
Lecture Notes in Computer Science
2010-01-05Paper
Efficient public key encryption based on ideal lattices (extended abstract)
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Public Key Cryptography – PKC 2004
Lecture Notes in Computer Science
2009-05-14Paper
On Secure Multi-party Computation in Black-Box Groups
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
Collision in the DSA Function
Coding and Cryptology
2009-03-09Paper
A Critical Look at Cryptographic Hash Function Literature
Coding and Cryptology
2009-03-09Paper
The Current Status in Design of Efficient Provably Secure Cryptographic Pseudorandom Generators
Coding and Cryptology
2009-03-09Paper
Lattice-based treshold-changeability for standard CRT secret-sharing schemes
Finite Fields and their Applications
2009-02-09Paper
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits
Cryptology and Network Security
2009-01-09Paper
Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes
IEEE Transactions on Information Theory
2008-12-21Paper
Cryptanalysis of LASH
Fast Software Encryption
2008-09-18Paper
A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders
Lecture Notes in Computer Science
2008-06-17Paper
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature
Lecture Notes in Computer Science
2008-04-17Paper
VSH, an Efficient and Provable Collision-Resistant Hash Function
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
Formal proofs for the security of signcryption
Journal of Cryptology
2007-05-03Paper
Public Key Cryptography - PKC 2006
Lecture Notes in Computer Science
2007-05-02Paper
New constructions of anonymous membership broadcasting schemes
Advances in Mathematics of Communications
2007-04-05Paper
Chinese remaindering with multiplicative noise
Theory of Computing Systems
2007-02-14Paper
Public Key Cryptography - PKC 2005
Lecture Notes in Computer Science
2005-12-07Paper
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes
 
2005-08-12Paper
On the security of RSA with primes sharing least-significant bits
Applicable Algebra in Engineering, Communication and Computing
2005-02-09Paper
scientific article; zbMATH DE number 2086897 (Why is no real title available?)
 
2004-08-11Paper
scientific article; zbMATH DE number 2085423 (Why is no real title available?)
 
2004-08-09Paper
Noisy Chinese remaindering in the Lee norm
Journal of Complexity
2004-08-06Paper
scientific article; zbMATH DE number 2080187 (Why is no real title available?)
 
2004-08-04Paper
scientific article; zbMATH DE number 1950347 (Why is no real title available?)
 
2003-07-17Paper
scientific article; zbMATH DE number 1617917 (Why is no real title available?)
 
2002-11-04Paper
scientific article; zbMATH DE number 1759660 (Why is no real title available?)
 
2002-10-10Paper


Research outcomes over time


This page was built for person: Ron Steinfeld