Serge Fehr

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
On the (in)security of the BUFF transform2024-12-04Paper
On fully-secure honest majority MPC without \(n^2\) round overhead2024-10-16Paper
Generalized special-sound interactive proofs and their knowledge soundness2024-08-02Paper
On the Quantum Security of HAWK2024-04-26Paper
Fixing and mechanizing the security proof of Fiat-Shamir with aborts and Dilithium
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
Fiat-Shamir transformation of multi-round interactive proofs (Extended version)
Journal of Cryptology
2023-08-22Paper
Fiat-Shamir transformation of multi-round interactive proofs
Theory of Cryptography
2023-08-14Paper
Adaptive versus static multi-oracle algorithms, and quantum security of a split-key PRF
Theory of Cryptography
2023-08-14Paper
Adaptive versus static multi-oracle algorithms, and quantum security of a split-key PRF
Theory of Cryptography
2023-08-14Paper
Efficient NIZKs and signatures from commit-and-open protocols in the QROM
Advances in Cryptology – CRYPTO 2022
2023-06-28Paper
Efficient NIZKs and signatures from commit-and-open protocols in the QROM
Advances in Cryptology – CRYPTO 2022
2023-06-28Paper
Parallel repetition of \((k_1,\dots ,k_{\mu }) \)-special-sound multi-round interactive proofs
Advances in Cryptology – CRYPTO 2022
2023-06-12Paper
The measure-and-reprogram technique 2.0: multi-round Fiat-Shamir and more
(available as arXiv preprint)
2022-12-07Paper
Online-extractability in the quantum random-oracle model
(available as arXiv preprint)
2022-08-30Paper
Compressing proofs of \(k\)-out-of-\(n\) partial knowledge2022-05-18Paper
Robust secret sharing with almost optimal share size and security against rushing adversaries2022-03-23Paper
On the quantum complexity of the continuous hidden subgroup problem2022-03-23Paper
On the compressed-oracle technique, and post-quantum security of proofs of sequential work
(available as arXiv preprint)
2021-12-08Paper
Sublinear bounds on the distinguishing advantage for multiple samples2021-02-23Paper
A monogamy-of-entanglement game with applications to device-independent quantum cryptography
New Journal of Physics
2020-12-18Paper
Security of the Fiat-Shamir transformation in the quantum random-oracle model
(available as arXiv preprint)
2020-03-09Paper
Towards optimal robust secret sharing with security against a rushing adversary2020-02-04Paper
Secure certification of mixed quantum states with application to two-party randomness generation
(available as arXiv preprint)
2018-12-06Paper
Secure certification of mixed quantum states with application to two-party randomness generation2018-12-06Paper
Classical proofs for the quantum collapsing property of classical hash functions2018-12-06Paper
Quantum authentication and encryption with key recycling. Or: how to re-use a one-time pad even if \(\mathsf{P}= \mathsf{NP}\) -- safely \& feasibly
Lecture Notes in Computer Science
2017-06-23Paper
On the Conditional Rényi Entropy
IEEE Transactions on Information Theory
2017-05-16Paper
The garden-hose model
Proceedings of the 4th conference on Innovations in Theoretical Computer Science
2017-05-16Paper
On the parallel repetition of multi-player games: the no-signaling case
(available as arXiv preprint)
2017-03-13Paper
Cheater detection in SPDZ multiparty computation
Lecture Notes in Computer Science
2017-01-06Paper
Adaptive versus non-adaptive strategies in the quantum setting with applications
Advances in Cryptology – CRYPTO 2016
2016-11-09Paper
On the Composition of Two-Prover Commitments, and Applications to Multi-round Relativistic Commitments
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
Multi-prover commitments against non-signaling attacks
Lecture Notes in Computer Science
2015-12-10Paper
An all-but-one entropic uncertainty relation, and application to password-based identification
Theory of Quantum Computation, Communication, and Cryptography
2015-12-03Paper
Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
Secure identification and QKD in the bounded-quantum-storage model
Theoretical Computer Science
2014-12-02Paper
Position-based quantum cryptography: impossibility and constructions
SIAM Journal on Computing
2014-06-04Paper
On quantum Rényi entropies: a new generalization and some properties
Journal of Mathematical Physics
2014-04-28Paper
Algebraic manipulation detection codes
Science China. Mathematics
2014-03-05Paper
One-sided device-independent QKD and position-based cryptography from monogamy games
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Feasibility and completeness of cryptographic tasks in the quantum world
Theory of Cryptography
2013-03-18Paper
Near-linear unconditionally-secure multiparty computation with a dishonest minority
Lecture Notes in Computer Science
2012-09-25Paper
Unconditionally-secure robust secret sharing with compact shares
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Position-based quantum cryptography: impossibility and constructions
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Secure Authentication from a Weak Key, without Leaking Information
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
Sampling in a quantum population, and applications
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
Quantum cryptography
Foundations of Physics
2010-06-09Paper
Encryption schemes secure against chosen-ciphertext selective opening attacks
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Improving the Security of Quantum Protocols via Commit-and-Open
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
Theory of Cryptography
Lecture Notes in Computer Science
2009-05-14Paper
A Tight High-Order Entropic Quantum Uncertainty Relation with Applications
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
Secure Identification and QKD in the Bounded-Quantum-Storage Model
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
Composing Quantum Protocols in a Classical Environment
Theory of Cryptography
2009-03-03Paper
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
Lecture Notes in Computer Science
2009-02-10Paper
Cryptography in the Bounded-Quantum-Storage Model
SIAM Journal on Computing
2008-12-22Paper
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields
Advances in Cryptology – CRYPTO 2005
2008-03-17Paper
Randomness Extraction Via δ-Biased Masking in the Presence of a Quantum Attacker
Theory of Cryptography
2008-03-05Paper
Oblivious Transfer and Linear Functions
Lecture Notes in Computer Science
2007-09-04Paper
Perfect NIZK with Adaptive Soundness
Theory of Cryptography
2007-08-30Paper
Advances in Cryptology – CRYPTO 2004
Lecture Notes in Computer Science
2005-08-23Paper
Advances in Cryptology – CRYPTO 2004
Lecture Notes in Computer Science
2005-08-23Paper
scientific article; zbMATH DE number 2009982 (Why is no real title available?)2003-11-26Paper
Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments
Lecture Notes in Computer Science
2003-07-16Paper
scientific article; zbMATH DE number 1942444 (Why is no real title available?)2003-06-30Paper
scientific article; zbMATH DE number 1942426 (Why is no real title available?)2003-06-30Paper
scientific article; zbMATH DE number 1842509 (Why is no real title available?)2002-12-08Paper


Research outcomes over time


This page was built for person: Serge Fehr