Folgen
Anja Lehmann
Anja Lehmann
Hasso Plattner Institute, University of Potsdam
Bestätigte E-Mail-Adresse bei hpi.de
Titel
Zitiert von
Zitiert von
Jahr
Random oracles in a quantum world
D Boneh, Ö Dagdelen, M Fischlin, A Lehmann, C Schaffner, M Zhandry
Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011
5822011
Distributed single sign-on
J Camenisch, Y Gilad, A Lehmann, G Neven
US Patent 9,705,872, 2017
1842017
Security of sanitizable signatures revisited
C Brzuska, M Fischlin, T Freudenreich, A Lehmann, M Page, J Schelbert, ...
Public Key Cryptography–PKC 2009: 12th International Conference on Practice …, 2009
1832009
Anonymous attestation using the strong diffie hellman assumption revisited
J Camenisch, M Drijvers, A Lehmann
Trust and Trustworthy Computing: 9th International Conference, TRUST 2016 …, 2016
1512016
Unlinkability of sanitizable signatures
C Brzuska, M Fischlin, A Lehmann, D Schröder
Public Key Cryptography–PKC 2010: 13th International Conference on Practice …, 2010
1222010
The wonderful world of global random oracles
J Camenisch, M Drijvers, T Gagliardoni, A Lehmann, G Neven
Annual International Conference on the Theory and Applications of …, 2018
1062018
Random oracles with (out) programmability
M Fischlin, A Lehmann, T Ristenpart, T Shrimpton, M Stam, S Tessaro
International Conference on the Theory and Application of Cryptology and …, 2010
1052010
Updatable encryption with post-compromise security
A Lehmann, B Tackmann
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
952018
Universally composable direct anonymous attestation
J Camenisch, M Drijvers, A Lehmann
Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016
932016
One TPM to bind them all: Fixing TPM 2.0 for provably secure anonymous attestation
J Camenisch, L Chen, M Drijvers, A Lehmann, D Novick, R Urian
2017 IEEE Symposium on Security and Privacy (SP), 901-920, 2017
812017
Optimal distributed password verification
J Camenisch, A Lehmann, G Neven
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
782015
Formal treatment of privacy-enhancing credential systems
J Camenisch, S Krenn, A Lehmann, GL Mikkelsen, G Neven, ...
International Conference on Selected Areas in Cryptography, 3-24, 2015
782015
On the joint security of encryption and signature in EMV
JP Degabriele, A Lehmann, KG Paterson, NP Smart, M Strefler
Topics in Cryptology–CT-RSA 2012: The Cryptographers’ Track at the RSA …, 2012
772012
Memento: How to reconstruct your secrets from a single password in a hostile environment
J Camenisch, A Lehmann, A Lysyanskaya, G Neven
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
702014
Concepts and languages for privacy-preserving attribute-based authentication
J Camenisch, M Dubovitskaya, A Lehmann, G Neven, C Paquin, ...
Policies and Research in Identity Management: Third IFIP WG 11.6 Working …, 2013
692013
Short threshold dynamic group signatures
J Camenisch, M Drijvers, A Lehmann, G Neven, P Towa
International conference on security and cryptography for networks, 401-423, 2020
632020
(R)CCA Secure Updatable Encryption with Integrity Protection
M Klooß, A Lehmann, A Rupp
Eurocrypt, 2019
602019
History-free aggregate message authentication codes
O Eikemeier, M Fischlin, JF Götzmann, A Lehmann, D Schröder, ...
Security and Cryptography for Networks: 7th International Conference, SCN …, 2010
552010
PESTO: proactively secure distributed single sign-on, or how to trust a hacked server
C Baum, T Frederiksen, J Hesse, A Lehmann, A Yanai
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 587-606, 2020
522020
SoK: oblivious pseudorandom functions
S Casacuberta, J Hesse, A Lehmann
2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P), 625-646, 2022
462022
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20