Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
150 Publications
2015 | Published | Conference Paper | IST-REx-ID: 1668 |
Gazi, Peter, et al. Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes. Vol. 9054, Springer, 2015, pp. 319–41, doi:10.1007/978-3-662-48116-5_16.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| WoS
2015 | Published | Conference Paper | IST-REx-ID: 1669 |
Pietrzak, Krzysztof Z., and Maciej Skórski. The Chain Rule for HILL Pseudoentropy, Revisited. Vol. 9230, Springer, 2015, pp. 81–98, doi:10.1007/978-3-319-22174-8_5.
[Submitted Version]
View
| Files available
| DOI
| WoS
2015 | Published | Conference Paper | IST-REx-ID: 1671 |
Gazi, Peter, et al. The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC. Vol. 9215, Springer, 2015, pp. 368–87, doi:10.1007/978-3-662-47989-6_18.
[Submitted Version]
View
| Files available
| DOI
| WoS
2014 | Published | Conference Paper | IST-REx-ID: 1907 |
Demay, Grégory, et al. “Optimality of Non-Adaptive Strategies: The Case of Parallel Games.” IEEE International Symposium on Information Theory, 6875125, IEEE, 2014, doi:10.1109/ISIT.2014.6875125.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2014 | Published | Conference Paper | IST-REx-ID: 2185 |
Dodis, Yevgeniy, et al. Key Derivation without Entropy Waste. Edited by Phong Nguyen and Elisabeth Oswald, vol. 8441, Springer, 2014, pp. 93–110, doi:10.1007/978-3-642-55220-5_6.
[Submitted Version]
View
| Files available
| DOI
2014 | Published | Conference Paper | IST-REx-ID: 2219 |
Kiltz, Eike, et al. Simple Chosen-Ciphertext Security from Low Noise LPN. Vol. 8383, Springer, 2014, pp. 1–18, doi:10.1007/978-3-642-54631-0_1.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2014 | Published | Conference Paper | IST-REx-ID: 2047 |
Yu, Fei, et al. “Differentially-Private Logistic Regression for Detecting Multiple-SNP Association in GWAS Databases.” Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), edited by Josep Domingo Ferrer, vol. 8744, Springer, 2014, pp. 170–84, doi:10.1007/978-3-319-11257-2_14.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| arXiv
2014 | Published | Conference Paper | IST-REx-ID: 1643 |
Fuchsbauer, Georg. “Constrained Verifiable Random Functions .” SCN 2014, edited by Michel Abdalla and Roberto De Prisco, vol. 8642, Springer, 2014, pp. 95–114, doi:10.1007/978-3-319-10879-7_7.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2014 | Published | Conference Paper | IST-REx-ID: 2045 |
Dachman Soled, Dana, et al. “Enhanced Chosen-Ciphertext Security and Applications.” Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), edited by Hugo Krawczyk, vol. 8383, Springer, 2014, pp. 329–44, doi:10.1007/978-3-642-54631-0_19.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2014 | Published | Conference Paper | IST-REx-ID: 2046 |
Bellare, Mihir, and Georg Fuchsbauer. “Policy-Based Signatures.” Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), edited by Hugo Krawczyk, vol. 8383, Springer, 2014, pp. 520–37, doi:10.1007/978-3-642-54631-0_30.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2014 | Published | Conference Paper | IST-REx-ID: 2082 |
Gazi, Peter, et al. The Exact PRF-Security of NMAC and HMAC. Edited by Juan Garay and Rosario Gennaro, vol. 8616, no. 1, Springer, 2014, pp. 113–30, doi:10.1007/978-3-662-44371-2_7.
[Submitted Version]
View
| Files available
| DOI
2014 | Published | Conference Paper | IST-REx-ID: 2236 |
Jetchev, Dimitar, and Krzysztof Z. Pietrzak. How to Fake Auxiliary Input. Edited by Yehuda Lindell, vol. 8349, Springer, 2014, pp. 566–90, doi:10.1007/978-3-642-54242-8_24.
[Submitted Version]
View
| Files available
| DOI
2014 | Published | Conference Paper | IST-REx-ID: 1927 |
Fuchsbauer, Georg, et al. “Adaptive Security of Constrained PRFs.” 20th International Conference on the Theory and Application of Cryptology and Information Security, vol. 8874, Springer Nature, 2014, pp. 82–101, doi:10.1007/978-3-662-45608-8_5.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2014 | Published | Journal Article | IST-REx-ID: 2852
Fischlin, Marc, et al. “Robust Multi-Property Combiners for Hash Functions.” Journal of Cryptology, vol. 27, no. 3, Springer, 2014, pp. 397–428, doi:10.1007/s00145-013-9148-7.
View
| Files available
| DOI
| WoS
2013 | Published | Conference Paper | IST-REx-ID: 2260 |
Bernhard, David, et al. Efficient Signatures of Knowledge and DAA in the Standard Model. Vol. 7954, Springer, 2013, pp. 518–33, doi:10.1007/978-3-642-38980-1_33.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2013 | Published | Journal Article | IST-REx-ID: 502
Blazy, Olivier, et al. “Short Blind Signatures.” Journal of Computer Security, vol. 21, no. 5, IOS Press, 2013, pp. 627–61, doi:10.3233/JCS-130477.
View
| DOI
2013 | Published | Conference Paper | IST-REx-ID: 2259 |
Alwen, Joel F., et al. Learning with Rounding, Revisited: New Reduction Properties and Applications. Vol. 8042, no. 1, Springer, 2013, pp. 57–74, doi:10.1007/978-3-642-40041-4_4.
[Published Version]
View
| Files available
| DOI
2013 | Published | Conference Paper | IST-REx-ID: 2258 |
Kiltz, Eike, et al. Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions. Vol. 8042, Springer, 2013, pp. 571–88, doi:10.1007/978-3-642-40041-4_31.
[Submitted Version]
View
| Files available
| DOI
2013 | Published | Conference Paper | IST-REx-ID: 2940 |
Krenn, Stephan, et al. A Counterexample to the Chain Rule for Conditional HILL Entropy, and What Deniable Encryption Has to Do with It. Edited by Amit Sahai, vol. 7785, Springer, 2013, pp. 23–39, doi:10.1007/978-3-642-36594-2_2.
[Submitted Version]
View
| Files available
| DOI
2013 | Published | Report | IST-REx-ID: 2274 |
Dziembowski, Stefan, et al. Proofs of Space. IST Austria, 2013.
[Published Version]
View
| Files available