Mlcapsule: Guarded offline deployment of machine learning as a service L Hanzlik, Y Zhang, K Grosse, A Salem, M Augustin, M Backes, M Fritz Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2021 | 134 | 2021 |
Ring signatures: logarithmic-size, no setup—from standard assumptions M Backes, N Döttling, L Hanzlik, K Kluczniak, J Schneider Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019 | 70 | 2019 |
Single secret leader election D Boneh, S Eskandarian, L Hanzlik, N Greco Proceedings of the 2nd ACM Conference on Advances in Financial Technologies …, 2020 | 62 | 2020 |
With a little help from my friends: Constructing practical anonymous credentials L Hanzlik, D Slamanig Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 49 | 2021 |
{simTPM}: User-centric {TPM} for Mobile Devices D Chakraborty, L Hanzlik, S Bugiel 28th USENIX Security Symposium (USENIX Security 19), 533-550, 2019 | 41 | 2019 |
Membership privacy for fully dynamic group signatures M Backes, L Hanzlik, J Schneider-Bensch Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 39 | 2019 |
Signatures with flexible public key: Introducing equivalence classes for public keys M Backes, L Hanzlik, K Kluczniak, J Schneider International Conference on the Theory and Application of Cryptology and …, 2018 | 34 | 2018 |
McFly: verifiable encryption to the future made practical N Döttling, L Hanzlik, B Magri, S Wohnig International Conference on Financial Cryptography and Data Security, 252-269, 2023 | 31 | 2023 |
Token meets wallet: Formalizing privacy and revocation for FIDO2 L Hanzlik, J Loss, B Wagner 2023 IEEE Symposium on Security and Privacy (SP), 1491-1508, 2023 | 28 | 2023 |
PI-cut-choo and friends: Compact blind signatures via parallel instance cut-and-choose and more R Chairattana-Apirom, L Hanzlik, J Loss, A Lysyanskaya, B Wagner Annual International Cryptology Conference, 3-31, 2022 | 25 | 2022 |
Simplified PACE| AA Protocol L Hanzlik, Ł Krzywiecki, M Kutyłowski International Conference on Information Security Practice and Experience …, 2013 | 21 | 2013 |
Thermal Imaging Attacks on Keypad Security Systems. W Wodo, L Hanzlik SECRYPT, 458-464, 2016 | 20 | 2016 |
Rai-choo! Evolving blind signatures to the next level L Hanzlik, J Loss, B Wagner Annual International Conference on the Theory and Applications of …, 2023 | 17 | 2023 |
Efficient non-interactive zero-knowledge proofs in cross-domains without trusted setup M Backes, L Hanzlik, A Herzberg, A Kate, I Pryvalov IACR International Workshop on Public Key Cryptography, 286-313, 2019 | 17 | 2019 |
Controlled randomness–a defense against backdoors in cryptographic devices L Hanzlik, K Kluczniak, M Kutyłowski Paradigms in Cryptology–Mycrypt 2016. Malicious and Exploratory Cryptology …, 2017 | 16 | 2017 |
Feido: Recoverable FIDO2 tokens using electronic ids F Schwarz, K Do, G Heide, L Hanzlik, C Rossow Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 15 | 2022 |
How not to handle keys: Timing attacks on FIDO authenticator privacy M Kepkowski, L Hanzlik, I Wood, MA Kaafar arXiv preprint arXiv:2205.08071, 2022 | 14 | 2022 |
Mutual restricted identification L Hanzlik, K Kluczniak, M Kutyłowski, Ł Krzywiecki Public Key Infrastructures, Services and Applications: 10th European …, 2014 | 11 | 2014 |
Pseudonymous signature on eIDAS token–implementation based privacy threats M Kutyłowski, L Hanzlik, K Kluczniak Australasian Conference on Information Security and Privacy, 467-477, 2016 | 10 | 2016 |
A short paper on blind signatures from knowledge assumptions L Hanzlik, K Kluczniak International Conference on Financial Cryptography and Data Security, 535-543, 2016 | 10 | 2016 |