Dennis Hofheinz
Dennis Hofheinz
Department of Computer Science, ETH Zürich
Verified email at inf.ethz.ch - Homepage
Title
Cited by
Cited by
Year
Bonsai trees, or how to delegate a lattice basis
D Cash, D Hofheinz, E Kiltz, C Peikert
Annual International Conference on the Theory and Applications of …, 2010
7442010
Secure hybrid encryption from weakened key encapsulation
D Hofheinz, E Kiltz
Annual International Cryptology Conference, 553-571, 2007
3052007
Possibility and impossibility results for encryption and commitment secure under selective opening
M Bellare, D Hofheinz, S Yilek
Annual International Conference on the Theory and Applications of …, 2009
2022009
A modular analysis of the Fujisaki-Okamoto transformation
D Hofheinz, K Hövelmanns, E Kiltz
Theory of Cryptography Conference, 341-371, 2017
1982017
Programmable hash functions and their applications
D Hofheinz, E Kiltz
Annual International Cryptology Conference, 21-38, 2008
1362008
Tightly secure signatures and public-key encryption
D Hofheinz, T Jager
Designs, Codes and Cryptography 80 (1), 29-61, 2016
1342016
Practical chosen ciphertext secure encryption from factoring
D Hofheinz, E Kiltz
Annual International Conference on the Theory and Applications of …, 2009
1322009
Bounded key-dependent message security
B Barak, I Haitner, D Hofheinz, Y Ishai
Annual International Conference on the Theory and Applications of …, 2010
1282010
Obfuscation for cryptographic purposes
D Hofheinz, J Malone-Lee, M Stam
Journal of Cryptology 23 (1), 121-168, 2010
1172010
A practical attack on some braid group based cryptographic primitives
D Hofheinz, R Steinwandt
International Workshop on Public Key Cryptography, 187-198, 2003
1062003
The group of signed quadratic residues and applications
D Hofheinz, E Kiltz
Annual International Cryptology Conference, 637-653, 2009
942009
Programmable hash functions in the multilinear setting
ESV Freire, D Hofheinz, KG Paterson, C Striecks
Annual Cryptology Conference, 513-530, 2013
922013
Bounded CCA2-secure encryption
R Cramer, G Hanaoka, D Hofheinz, H Imai, E Kiltz, R Pass, A Shelat, ...
International Conference on the Theory and Application of Cryptology and …, 2007
872007
Non-interactive key exchange
ESV Freire, D Hofheinz, E Kiltz, KG Paterson
International Workshop on Public Key Cryptography, 254-271, 2013
742013
Universally composable commitments using random oracles
D Hofheinz, J Müller-Quade
Theory of Cryptography Conference, 58-76, 2004
732004
Encryption schemes secure against chosen-ciphertext selective opening attacks
S Fehr, D Hofheinz, E Kiltz, H Wee
Annual International Conference on the Theory and Applications of …, 2010
722010
CoSP: A general framework for computational soundness proofs
M Backes, D Hofheinz, D Unruh
Proceedings of the 16th ACM conference on Computer and communications …, 2009
712009
Towards key-dependent message security in the standard model
D Hofheinz, D Unruh
Annual International Conference on the Theory and Applications of …, 2008
712008
GNUC: A new universal composability framework
D Hofheinz, V Shoup
Journal of Cryptology 28 (3), 423-508, 2015
702015
How to Delegate a Lattice Basis.
D Cash, D Hofheinz, E Kiltz
IACR Cryptol. ePrint Arch. 2009, 351, 2009
702009
The system can't perform the operation now. Try again later.
Articles 1–20