Folgen
Nils Fleischhacker
Nils Fleischhacker
Assistant Professor, Ruhr-University Bochum
Bestätigte E-Mail-Adresse bei rub.de - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Limitations of the meta-reduction technique: The case of schnorr signatures
M Fischlin, N Fleischhacker
Annual International Conference on the Theory and Applications of …, 2013
552013
Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys
N Fleischhacker, J Krupp, G Malavolta, J Schneider, D Schröder, ...
Public-Key Cryptography–PKC 2016, 301-330, 2016
542016
On tight security proofs for Schnorr signatures
N Fleischhacker, T Jager, D Schröder
International Conference on the Theory and Application of Cryptology and …, 2014
442014
A modular framework for multi-factor authentication and key exchange
N Fleischhacker, M Manulis, A Azodi
International Conference on Research in Security Standardisation, 190-214, 2014
35*2014
Group signatures: Authentication with privacy
M Manulis, N Fleischhacker, F Günther, F Kiefer, B Poettrering
Bundesamt fur Sicherheit in der Informationstechnik, Bonn, Germany, Tech. Rep, 2012
33*2012
Efficient cryptographic password hardening services from partially oblivious commitments
J Schneider, N Fleischhacker, D Schröder, M Backes
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
202016
Feasibility and infeasibility of secure computation with malicious PUFs
D Dachman-Soled, N Fleischhacker, J Katz, A Lysyanskaya, D Schröder
Annual Cryptology Conference, 405-420, 2014
202014
On the existence of three round zero-knowledge proofs
N Fleischhacker, V Goyal, A Jain
Annual International Conference on the Theory and Applications of …, 2018
162018
On tight security proofs for Schnorr signatures
N Fleischhacker, T Jager, D Schröder
Journal of Cryptology 32 (2), 566-599, 2019
122019
On statistically secure obfuscation with approximate correctness
Z Brakerski, C Brzuska, N Fleischhacker
Annual International Cryptology Conference, 551-578, 2016
122016
Two-message, oblivious evaluation of cryptographic functionalities
N Döttling, N Fleischhacker, J Krupp, D Schröder
Annual International Cryptology Conference, 619-648, 2016
112016
SDF—Solar-aware distributed flow in wireless sensor networks
I Schweizer, N Fleischhacker, M Mühlhäuser, T Strufe
2011 IEEE 36th Conference on Local Computer Networks, 382-390, 2011
72011
Pseudorandom signatures
N Fleischhacker, F Günther, F Kiefer, M Manulis, B Poettering
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
42013
Robust property-preserving hash functions for hamming distance and more
N Fleischhacker, M Simkin
Annual International Conference on the Theory and Applications of …, 2021
32021
Property-Preserving Hash Functions from Standard Assumptions
N Fleischhacker, KG Larsen, M Simkin
arXiv preprint arXiv:2106.06453, 2021
22021
Feasibility and Infeasibility of Secure Computation with Malicious PUFs
D Dachman-Soled, N Fleischhacker, J Katz, A Lysyanskaya, D Schröder
Journal of Cryptology 33 (2), 595-617, 2020
22020
On publicly-accountable zero-knowledge and small shuffle arguments
N Fleischhacker, M Simkin
IACR International Conference on Public-Key Cryptography, 618-648, 2021
12021
Interactive Non-malleable Codes
N Fleischhacker, V Goyal, A Jain, A Paskin-Cherniavsky, S Radune
Theory of Cryptography Conference, 233-263, 2019
12019
Arithmetic garbling from bilinear maps
N Fleischhacker, G Malavolta, D Schröder
European Symposium on Research in Computer Security, 172-192, 2019
2019
Minimal assumptions in cryptography
N Fleischhacker
2016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20