Christoph Striecks
Cytowane przez
Cytowane przez
Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based
D Derler, K Samelin, D Slamanig, C Striecks
NDSS 2019, 2019
Programmable hash functions in the multilinear setting
ESV Freire, D Hofheinz, KG Paterson, C Striecks
CRYPTO 2013, 2013
Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
D Derler, K Gellert, T Jager, D Slamanig, C Striecks
Journal of Cryptology 2021 (extended version from EUROCRYPT 2018), 2021
Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting
D Hofheinz, J Koch, C Striecks
PKC 2015, 2015
Practical signatures from standard assumptions
F Böhl, D Hofheinz, T Jager, J Koch, JH Seo, C Striecks
EUROCRYPT 2013, 2013
Revisiting proxy re-encryption: forward secrecy, improved security, and applications
D Derler, S Krenn, T Lorünser, S Ramacher, D Slamanig, C Striecks
PKC 2018, 2018
Confined guessing: New signatures from standard assumptions
F Böhl, D Hofheinz, T Jager, J Koch, C Striecks
Journal of Cryptology 2015, 2015
Towards attribute-based credentials in the cloud
S Krenn, T Lorünser, A Salzer, C Striecks
CANS 2017, 2017
Opportunities and Challenges of CREDENTIAL
F Karegar, C Striecks, S Krenn, F Hörandner, T Lorünser, ...
IFIP International Summer School on Privacy and Identity Management 2016, 2016
Versatile and Sustainable Timed-Release Encryption and Sequential Time-Lock Puzzles
P Chvojka, T Jager, D Slamanig, C Striecks
ESORICS 2021, 2021
Fine-Grained Forward Secrecy: Allow-List/Deny-List Encryption and Applications
D Derler, S Ramacher, D Slamanig, C Striecks
Financial Cryptography and Data Security (FC) 2021, 2021
Privacy-preserving incentive systems with highly efficient point-collection
J Bobolz, F Eidens, S Krenn, D Slamanig, C Striecks
ASIACCS 2020, 2020
Practical group-signatures with privacy-friendly openings
S Krenn, K Samelin, C Striecks
International Conference on Availability, Reliability and Security (ARES) 2019, 2019
Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model
A Haque, S Krenn, D Slamanig, C Striecks
PKC 2022, 2020
Revisiting Updatable Encryption: True Forward Security, Constructions and a Puncturable Perspective
D Slamanig, C Striecks
IACR Cryptol. ePrint Arch. 2021, 2021
Batch-verifiable Secret Sharing with Unconditional Privacy
S Krenn, T Lorünser, C Striecks
ICISSP 2017, 2017
Collecting and Classifying Security and Privacy Design Patterns for Connected Vehicles: SECREDAS Approach
N Marko, A Vasenev, C Striecks
Computer Safety, Reliability, and Security. SAFECOMP Workshops – DECSoS 2020, 2020
CCA-Secure (Puncturable) KEMs from Encryption With Non-Negligible Decryption Errors
V Cini, S Ramacher, D Slamanig, C Striecks
ASIACRYPT 2020, 2020
A generic view on trace-and-revoke broadcast encryption schemes
D Hofheinz, C Striecks
Cryptographers’ Track at the RSA Conference (CT-RSA) 2014, 2014
Updatable Signatures and Message Authentication Codes
V Cini, S Ramacher, D Slamanig, C Striecks, E Tairi
PKC 2021, 2021
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20