Lucjan Hanzlik
Lucjan Hanzlik
CISPA, Saarland University, Saarland Informatics Campus
Verified email at cispa.saarland - Homepage
Title
Cited by
Cited by
Year
Mlcapsule: Guarded offline deployment of machine learning as a service
L Hanzlik, Y Zhang, K Grosse, A Salem, M Augustin, M Backes, M Fritz
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021
492021
Ring signatures: logarithmic-size, no setup—from standard assumptions
M Backes, N Döttling, L Hanzlik, K Kluczniak, J Schneider
Annual International Conference on the Theory and Applications of …, 2019
242019
Simplified PACE| AA Protocol
L Hanzlik, Ł Krzywiecki, M Kutyłowski
International Conference on Information Security Practice and Experience …, 2013
182013
Controlled randomness–a defense against backdoors in cryptographic devices
L Hanzlik, K Kluczniak, M Kutyłowski
International Conference on Cryptology in Malaysia, 215-232, 2016
152016
Membership privacy for fully dynamic group signatures
M Backes, L Hanzlik, J Schneider-Bensch
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
132019
Signatures with flexible public key: Introducing equivalence classes for public keys
M Backes, L Hanzlik, K Kluczniak, J Schneider
International Conference on the Theory and Application of Cryptology and …, 2018
122018
Single secret leader election
D Boneh, S Eskandarian, L Hanzlik, N Greco
Proceedings of the 2nd ACM Conference on Advances in Financial Technologies …, 2020
82020
simTPM: User-centric {TPM} for Mobile Devices
D Chakraborty, L Hanzlik, S Bugiel
28th {USENIX} Security Symposium ({USENIX} Security 19), 533-550, 2019
82019
A short paper on blind signatures from knowledge assumptions
L Hanzlik, K Kluczniak
International Conference on Financial Cryptography and Data Security, 535-543, 2016
82016
A short paper on how to improve U-Prove using self-blindable certificates
L Hanzlik, K Kluczniak
International Conference on Financial Cryptography and Data Security, 273-282, 2014
82014
Signatures with Flexible Public Key: A Unified Approach to Privacy-Preserving Signatures (Full Version).
M Backes, L Hanzlik, K Kluczniak, J Schneider
IACR Cryptol. ePrint Arch. 2018, 191, 2018
72018
Thermal Imaging Attacks on Keypad Security Systems.
W Wodo, L Hanzlik
SECRYPT, 458-464, 2016
72016
Pseudonymous signature on eIDAS token–implementation based privacy threats
M Kutyłowski, L Hanzlik, K Kluczniak
Australasian Conference on Information Security and Privacy, 467-477, 2016
72016
Mutual restricted identification
L Hanzlik, K Kluczniak, M Kutyłowski, Ł Krzywiecki
European Public Key Infrastructure Workshop, 119-133, 2013
72013
Mutual chip authentication
L Hanzlik, K Kluczniak, L Krzywiecki, M Kutylowski
2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013
62013
Efficient non-interactive zero-knowledge proofs in cross-domains without trusted setup
M Backes, L Hanzlik, A Herzberg, A Kate, I Pryvalov
IACR International Workshop on Public Key Cryptography, 286-313, 2019
52019
Restricted identification without group keys
L Hanzlik, K Kluczniak, P Kubiak, M Kutylowski
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
52012
Hard invalidation of electronic signatures
L Hanzlik, M Kutyłowski, M Yung
International Conference on Information Security Practice and Experience …, 2015
42015
Attack on U-Prove revocation scheme from FC’13-passing verification by revoked users
L Hanzlik, K Kluczniak, M Kutyłowski
International Conference on Financial Cryptography and Data Security, 283-290, 2014
42014
Towards Practical Security of Pseudonymous Signature on the BSI eIDAS Token
L Hanzlik, K Kluczniak
Cryptology ePrint Archive, 2018
32018
The system can't perform the operation now. Try again later.
Articles 1–20