Dominique Unruh
Dominique Unruh
Verified email at ut.ee
TitleCited byYear
Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol
M Backes, M Maffei, D Unruh
2008 IEEE Symposium on Security and Privacy (sp 2008), 202-215, 2008
1732008
Compromising reflections-or-how to read LCD monitors around the corner
M Backes, M Dürmuth, D Unruh
2008 IEEE Symposium on Security and Privacy (sp 2008), 158-169, 2008
1132008
Universally composable quantum multi-party computation
D Unruh
Annual International Conference on the Theory and Applications of …, 2010
872010
Non-interactive zero-knowledge proofs in the quantum random oracle model
D Unruh
Annual International Conference on the Theory and Applications of …, 2015
702015
Quantum proofs of knowledge
D Unruh
Annual International Conference on the Theory and Applications of …, 2012
702012
CoSP: A general framework for computational soundness proofs
M Backes, D Hofheinz, D Unruh
Proceedings of the 16th ACM conference on Computer and communications …, 2009
702009
Towards key-dependent message security in the standard model
D Hofheinz, D Unruh
Annual International Conference on the Theory and Applications of …, 2008
682008
Quantum attacks on classical proof systems: The hardness of quantum rewinding
A Ambainis, A Rosmanis, D Unruh
2014 IEEE 55th Annual Symposium on Foundations of Computer Science, 474-483, 2014
662014
Computationally sound verification of source code
M Backes, M Maffei, D Unruh
Proceedings of the 17th ACM conference on Computer and communications …, 2010
652010
Computational soundness of symbolic zero-knowledge proofs against active attackers
M Backes, D Unruh
2008 21st IEEE Computer Security Foundations Symposium, 255-269, 2008
552008
Universally composable zero-knowledge arguments and commitments from signature cards
D Hofheinz, J Müller-Quade, D Unruh
5th Central European Conference on Cryptology, 2005
552005
Revocable quantum timed-release encryption
D Unruh
Journal of the ACM (JACM) 62 (6), 49, 2015
522015
OAEP is secure under key-dependent messages
M Backes, M Dürmuth, D Unruh
International Conference on the Theory and Application of Cryptology and …, 2008
522008
Quantum position verification in the random oracle model
D Unruh
Annual Cryptology Conference, 1-18, 2014
482014
Post-quantum security of the Fujisaki-Okamoto and OAEP transforms
EE Targhi, D Unruh
Theory of Cryptography Conference, 192-216, 2016
472016
CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable
M Backes, P Druschel, A Haeberlen, D Unruh
NDSS 2009, 341-353, 2009
462009
A formal language for cryptographic pseudocode
M Backes, M Berg, D Unruh
International Conference on Logic for Programming Artificial Intelligence …, 2008
452008
Random oracles and auxiliary input
D Unruh
Annual International Cryptology Conference, 205-223, 2007
402007
Security of blind signatures revisited
D Schröder, D Unruh
International Workshop on Public Key Cryptography, 662-679, 2012
36*2012
Round optimal blind signatures
S Garg, V Rao, A Sahai, D Schröder, D Unruh
Annual Cryptology Conference, 630-648, 2011
362011
The system can't perform the operation now. Try again later.
Articles 1–20