Folgen
Stephan Krenn
Stephan Krenn
Bestätigte E-Mail-Adresse bei ait.ac.at
Titel
Zitiert von
Zitiert von
Jahr
Cache games--bringing access-based cache attacks on AES to practice
D Gullasch, E Bangerter, S Krenn
2011 IEEE Symposium on Security and Privacy, 490-505, 2011
7232011
Learning with Rounding, Revisited: New Reduction, Properties and Applications
J Alwen, S Krenn, K Pietrzak, D Wichs
Advances in Cryptology–CRYPTO 2013, 2013
2432013
Chameleon-hashes with ephemeral trapdoors: And applications to invisible sanitizable signatures
J Camenisch, D Derler, S Krenn, HC Pöhls, K Samelin, D Slamanig
Public-Key Cryptography–PKC 2017: 20th IACR International Conference on …, 2017
1672017
Better zero-knowledge proofs for lattice encryption and their application to group signatures
F Benhamouda, J Camenisch, S Krenn, V Lyubashevsky, G Neven
International Conference on the Theory and Application of Cryptology and …, 2014
1472014
Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise
A Jain, S Krenn, K Pietrzak, A Tentes
1412011
Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings
F Benhamouda, S Krenn, V Lyubashevsky, K Pietrzak
European Symposium on Research in Computer Science - ESORICS, 2015
1122015
Formal Treatment of Privacy-Enhancing Credential Systems
J Camenisch, S Krenn, A Lehmann, GL Mikkelsen, G Neven, ...
https://eprint.iacr.org/, 2014
812014
A framework for practical universally composable zero-knowledge protocols
J Camenisch, S Krenn, V Shoup
International Conference on the Theory and Application of Cryptology and …, 2011
722011
A certifying compiler for zero-knowledge proofs of knowledge based on σ-protocols
JB Almeida, E Bangerter, M Barbosa, S Krenn, AR Sadeghi, T Schneider
Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010
672010
Full proof cryptography: verifiable compilation of efficient zero-knowledge protocols
J Bacelar Almeida, M Barbosa, E Bangerter, G Barthe, S Krenn, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
552012
Revisiting proxy re-encryption: forward secrecy, improved security, and applications
D Derler, S Krenn, T Lorünser, S Ramacher, D Slamanig, C Striecks
IACR international workshop on public key cryptography, 219-250, 2018
532018
Universal composition with responsive environments
J Camenisch, RR Enderlein, S Krenn, R Küsters, D Rausch
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
532016
Issuer-hiding attribute-based credentials
J Bobolz, F Eidens, S Krenn, S Ramacher, K Samelin
Cryptology and Network Security: 20th International Conference, CANS 2021 …, 2021
402021
iUC: Flexible universal composability made simple
J Camenisch, S Krenn, R Küsters, D Rausch
International Conference on the Theory and Application of Cryptology and …, 2019
332019
CREDENTIAL: a framework for privacy-preserving cloud-based data sharing
F Hörandner, S Krenn, A Migliavacca, F Thiemer, B Zwattendorfer
2016 11th International Conference on Availability, Reliability and Security …, 2016
312016
Automatic generation of sound zero-knowledge protocols
E Bangerter, J Camenisch, S Krenn, AR Sadeghi, T Schneider
Cryptology ePrint Archive, 2008
302008
Architecture for Attribute-based Credential Technologies
P Bichsel, J Camenisch, M Dubovitskaya, RR Enderlein, S Krenn, ...
ABC4Trust - Deliverable to the European Commision, 2014
29*2014
Practical strongly invisible and strongly accountable sanitizable signatures
MT Beck, J Camenisch, D Derler, S Krenn, HC Pöhls, K Samelin, ...
Information Security and Privacy: 22nd Australasian Conference, ACISP 2017 …, 2017
272017
Bringing Zero-Knowledge Proofs of Knowledge to Practice
S Krenn
Security Protocols XVII, 63-68, 2009
26*2009
Stronger security for sanitizable signatures
S Krenn, K Samelin, D Sommer
International Workshop on Data Privacy Management, 100-117, 2015
252015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20