Everlasting UC Commitments from Fully Malicious PUFs | 0 | 0.34 | 2022 |
ROAST: Robust Asynchronous Schnorr Threshold Signatures | 0 | 0.34 | 2022 |
A Security Framework for Distributed Ledgers | 0 | 0.34 | 2021 |
OpenSquare: Decentralized Repeated Modular Squaring Service | 0 | 0.34 | 2021 |
Feasibility and Infeasibility of Secure Computation with Malicious PUFs | 5 | 0.40 | 2020 |
The Patient As Genomic Data Manager - Evaluation Of The Promise App | 0 | 0.34 | 2020 |
Omniring - Scaling Private Payments Without Trusted Setup. | 1 | 0.35 | 2019 |
Arithmetic Garbling from Bilinear Maps. | 0 | 0.34 | 2019 |
Efficient Invisible and Unlinkable Sanitizable Signatures | 0 | 0.34 | 2019 |
(Short Paper) Burning Zerocoins for Fun and for Profit - A Cryptographic Denial-of-Spending Attack on the Zerocoin Protocol | 0 | 0.34 | 2018 |
Delegatable functional signatures. | 0 | 0.34 | 2018 |
Burning Zerocoins for Fun and for Profit: A Cryptographic Denial-of-Spending Attack on the Zerocoin Protocol. | 0 | 0.34 | 2018 |
Efficient Ring Signatures in the Standard Model. | 4 | 0.38 | 2017 |
Phoenix: Rebirth Of A Cryptographic Password-Hardening Service | 0 | 0.34 | 2017 |
Maliciously Secure Multi-Client ORAM. | 1 | 0.37 | 2017 |
Two-Message, Oblivious Evaluation of Cryptographic Functionalities. | 4 | 0.38 | 2017 |
Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments. | 1 | 0.35 | 2016 |
Nearly Optimal Verifiable Data Streaming. | 6 | 0.47 | 2016 |
Nearly Optimal Verifiable Data Streaming (Full Version). | 0 | 0.34 | 2015 |
Foundations of Reconfigurable PUFs. | 0 | 0.34 | 2015 |
Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of Bitcoins | 23 | 1.26 | 2015 |
Efficient Pseudorandom Functions via On-the-Fly Adaptation | 10 | 0.44 | 2015 |
Verifiably Encrypted Signatures: Security Revisited And A New Construction | 2 | 0.35 | 2015 |
Foundations of Reconfigurable PUFs (Full Version). | 0 | 0.34 | 2015 |
On Tight Security Proofs for Schnorr Signatures. | 14 | 0.56 | 2014 |
WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP. | 3 | 0.42 | 2014 |
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens. | 4 | 0.37 | 2014 |
Brief announcement: towards security and privacy for outsourced data in the multi-party setting | 0 | 0.34 | 2014 |
POSTER: Enhancing Security and Privacy with Google Glass | 0 | 0.34 | 2014 |
Operational Signature Schemes. | 4 | 0.38 | 2014 |
Ubic: Bridging the Gap between Digital Cryptography and the Physical World. | 6 | 0.96 | 2014 |
Aggregate and Verifiably Encrypted Signatures from Multilinear Maps without Random Oracles | 8 | 0.72 | 2013 |
Verifiable data streaming | 7 | 0.51 | 2013 |
Highly Controlled, Fine-grained Delegation of Signing Capabilities. | 0 | 0.34 | 2013 |
Unconditional Tightness Bounds for Generic Reductions: The Exact Security of Schnorr Signatures, Revisited. | 0 | 0.34 | 2013 |
History-Free sequential aggregate signatures | 11 | 0.52 | 2012 |
Security Of Blind Signatures Under Aborts And Applications To Adaptive Oblivious Transfer | 3 | 0.38 | 2012 |
Security of blind signatures revisited | 11 | 0.61 | 2012 |
(Efficient) Universally Composable Two-Party Computation Using a Minimal Number of Stateless Tokens. | 0 | 0.34 | 2011 |
Expedient non-malleability notions for hash functions | 1 | 0.35 | 2011 |
Impossibility of blind signatures from one-way permutations | 11 | 0.47 | 2011 |
How to aggregate the CL signature scheme | 10 | 0.50 | 2011 |
Round optimal blind signatures | 20 | 0.59 | 2011 |
Unlinkability of Sanitizable Signatures | 37 | 0.97 | 2010 |
Public-key encryption with non-interactive opening: new constructions and stronger definitions | 12 | 0.50 | 2010 |
Uniqueness is a different story: impossibility of verifiable random functions from trapdoor permutations | 8 | 0.43 | 2010 |
On the impossibility of three-move blind signature schemes | 32 | 0.76 | 2010 |
Generic constructions for verifiably encrypted signatures without random oracles or NIZKs | 7 | 0.43 | 2010 |
History-free aggregate message authentication codes | 15 | 0.80 | 2010 |
Redactable signatures for tree-structured data: definitions and constructions | 40 | 1.16 | 2010 |