Folgen
Carsten Baum
Titel
Zitiert von
Zitiert von
Jahr
Turning your weakness into a strength: Watermarking deep neural networks by backdooring
Y Adi, C Baum, M Cisse, B Pinkas, J Keshet
27th {USENIX} Security Symposium ({USENIX} Security 18), 1615-1631, 2018
4882018
More efficient commitments from structured lattice assumptions
C Baum, I Damgård, V Lyubashevsky, S Oechsner, C Peikert
Security and Cryptography for Networks: 11th International Conference, SCN …, 2018
154*2018
Publicly auditable secure multi-party computation
C Baum, I Damgård, C Orlandi
Security and Cryptography for Networks: 9th International Conference, SCN …, 2014
1272014
Sub-Linear Lattice-Based Zero-Knowledge Arguments for Arithmetic Circuits⋆
C Baum, J Bootle, A Cerulli, R del Pino, J Groth, V Lyubashevsky
IACR Crypto 2018, 2018
892018
Towards Practical Lattice-Based One-Time Linkable Ring Signatures
C Baum, H Lin, S Oechsner
662018
: Zero-Knowledge Proofs for Boolean and Arithmetic Circuits with Nested Disjunctions
C Baum, AJ Malozemoff, MB Rosen, P Scholl
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
622021
Concretely-efficient zero-knowledge arguments for arithmetic circuits and their application to lattice-based cryptography
C Baum, A Nof
Public-Key Cryptography–PKC 2020: 23rd IACR International Conference on …, 2020
552020
Using TopGear in overdrive: a more efficient ZKPoK for SPDZ
C Baum, D Cozzo, NP Smart
Selected Areas in Cryptography–SAC 2019: 26th International Conference …, 2020
462020
P2DEX: privacy-preserving decentralized cryptocurrency exchange
C Baum, B David, TK Frederiksen
Applied Cryptography and Network Security: 19th International Conference …, 2021
412021
How to prove knowledge of small secrets
C Baum, I Damgård, KG Larsen, M Nielsen
Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016
402016
Better preprocessing for secure multiparty computation
C Baum, I Damgård, T Toft, R Zakarias
Applied Cryptography and Network Security: 14th International Conference …, 2016
372016
TARDIS: a foundation of time-lock puzzles in UC
C Baum, B David, R Dowsley, JB Nielsen, S Oechsner
Advances in Cryptology–EUROCRYPT 2021: 40th Annual International Conference …, 2021
36*2021
Insured MPC: Efficient secure computation with financial penalties
C Baum, B David, R Dowsley
Financial Cryptography and Data Security: 24th International Conference, FC …, 2020
34*2020
Efficient secure multiparty computation with identifiable abort
C Baum, E Orsini, P Scholl
Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing …, 2016
322016
Banquet: short and fast signatures from AES
C Baum, CD de Saint Guilhem, D Kales, E Orsini, P Scholl, G Zaverucha
Public-Key Cryptography–PKC 2021: 24th IACR International Conference on …, 2021
302021
Efficient constant-round MPC with identifiable abort and public verifiability
C Baum, E Orsini, P Scholl, E Soria-Vazquez
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
282020
CRAFT: Composable Randomness Beacons and Output-Independent Abort MPC From Time
C Baum, B David, R Dowsley, R Kishore, JB Nielsen, S Oechsner
Public-Key Cryptography–PKC 2023: 26th IACR International Conference on …, 2023
25*2023
Fairness in the eyes of the data: Certifying machine-learning models
S Segal, Y Adi, B Pinkas, C Baum, C Ganesh, J Keshet
Proceedings of the 2021 AAAI/ACM Conference on AI, Ethics, and Society, 926-935, 2021
222021
Sok: Mitigation of front-running in decentralized finance
C Baum, JH Chiang, B David, TK Frederiksen, L Gentile
Cryptology ePrint Archive, 2021
192021
PESTO: proactively secure distributed single sign-on, or how to trust a hacked server
C Baum, T Frederiksen, J Hesse, A Lehmann, A Yanai
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 587-606, 2020
182020
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20