Dominique Unruh
Dominique Unruh
Verified email at ut.ee
Title
Cited by
Cited by
Year
Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol
M Backes, M Maffei, D Unruh
2008 IEEE Symposium on Security and Privacy (sp 2008), 202-215, 2008
1802008
Compromising reflections-or-how to read LCD monitors around the corner
M Backes, M Dürmuth, D Unruh
2008 IEEE Symposium on Security and Privacy (sp 2008), 158-169, 2008
1242008
Non-interactive zero-knowledge proofs in the quantum random oracle model
D Unruh
Annual International Conference on the Theory and Applications of …, 2015
1082015
Universally composable quantum multi-party computation
D Unruh
Annual International Conference on the Theory and Applications of …, 2010
1022010
Quantum proofs of knowledge
D Unruh
Annual International Conference on the Theory and Applications of …, 2012
972012
Quantum attacks on classical proof systems: the hardness of quantum rewinding
A Ambainis, A Rosmanis, D Unruh
2014 IEEE 55th Annual Symposium on Foundations of Computer Science, 474-483, 2014
952014
Post-quantum security of the Fujisaki-Okamoto and OAEP transforms
EE Targhi, D Unruh
Theory of Cryptography Conference, 192-216, 2016
782016
Computationally sound verification of source code
M Backes, M Maffei, D Unruh
Proceedings of the 17th ACM conference on Computer and communications …, 2010
752010
Revocable quantum timed-release encryption
D Unruh
Journal of the ACM (JACM) 62 (6), 1-76, 2015
722015
CoSP: A general framework for computational soundness proofs
M Backes, D Hofheinz, D Unruh
Proceedings of the 16th ACM conference on Computer and communications …, 2009
712009
Towards key-dependent message security in the standard model
D Hofheinz, D Unruh
Annual International Conference on the Theory and Applications of …, 2008
712008
Universally composable zero-knowledge arguments and commitments from signature cards
D Hofheinz, J Müller-Quade, D Unruh
5th Central European Conference on Cryptology, 2005
602005
Quantum position verification in the random oracle model
D Unruh
Annual Cryptology Conference, 1-18, 2014
572014
Post-quantum security of Fiat-Shamir
D Unruh
International Conference on the Theory and Application of Cryptology and …, 2017
562017
Computational soundness of symbolic zero-knowledge proofs against active attackers
M Backes, D Unruh
2008 21st IEEE Computer Security Foundations Symposium, 255-269, 2008
562008
OAEP is secure under key-dependent messages
M Backes, M Dürmuth, D Unruh
International Conference on the Theory and Application of Cryptology and …, 2008
512008
Computationally binding quantum commitments
D Unruh
Annual International Conference on the Theory and Applications of …, 2016
502016
CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable
M Backes, P Druschel, A Haeberlen, D Unruh
NDSS 2009, 341-353, 2009
502009
Random oracles and auxiliary input
D Unruh
Annual International Cryptology Conference, 205-223, 2007
482007
A formal language for cryptographic pseudocode
M Backes, M Berg, D Unruh
International Conference on Logic for Programming Artificial Intelligence …, 2008
452008
The system can't perform the operation now. Try again later.
Articles 1–20