Anja Lehmann
Anja Lehmann
Hasso Plattner Institute, University of Potsdam
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
Random oracles in a quantum world
D Boneh, Ö Dagdelen, M Fischlin, A Lehmann, C Schaffner, M Zhandry
International conference on the theory and application of cryptology and …, 2011
Security of sanitizable signatures revisited
C Brzuska, M Fischlin, T Freudenreich, A Lehmann, M Page, J Schelbert, ...
International Workshop on Public Key Cryptography, 317-336, 2009
Unlinkability of sanitizable signatures
C Brzuska, M Fischlin, A Lehmann, D Schröder
International Workshop on Public Key Cryptography, 444-461, 2010
Random oracles with (out) programmability
M Fischlin, A Lehmann, T Ristenpart, T Shrimpton, M Stam, S Tessaro
International Conference on the Theory and Application of Cryptology and …, 2010
Distributed single sign-on
J Camenisch, Y Gilad, A Lehmann, G Neven
US Patent 9,705,872, 2017
On the joint security of encryption and signature in EMV
JP Degabriele, A Lehmann, KG Paterson, NP Smart, M Strefler
Cryptographers’ Track at the RSA Conference, 116-135, 2012
Anonymous attestation using the strong diffie hellman assumption revisited
J Camenisch, M Drijvers, A Lehmann
International Conference on Trust and Trustworthy Computing, 1-20, 2016
Concepts and languages for privacy-preserving attribute-based authentication
J Camenisch, M Dubovitskaya, A Lehmann, G Neven, C Paquin, ...
IFIP Working Conference on Policies and Research in Identity Management, 34-52, 2013
D2. 1 Architecture for Attribute-based Credential Technologies
J Camenisch, I Krontiris, A Lehmann, G Neven, C Paquin, K Rannenberg, ...
Deliverable, ABC4Trust EU Project, 2011
Universally composable direct anonymous attestation
J Camenisch, M Drijvers, A Lehmann
Public-Key Cryptography--PKC 2016, 234-264, 2016
Optimal distributed password verification
J Camenisch, A Lehmann, G Neven
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
One TPM to bind them all: Fixing TPM 2.0 for provably secure anonymous attestation
J Camenisch, L Chen, M Drijvers, A Lehmann, D Novick, R Urian
2017 IEEE Symposium on Security and Privacy (SP), 901-920, 2017
Memento: How to reconstruct your secrets from a single password in a hostile environment
J Camenisch, A Lehmann, A Lysyanskaya, G Neven
Annual Cryptology Conference, 256-275, 2014
History-free aggregate message authentication codes
O Eikemeier, M Fischlin, JF Götzmann, A Lehmann, D Schröder, ...
International Conference on Security and Cryptography for Networks, 309-328, 2010
The wonderful world of global random oracles
J Camenisch, M Drijvers, T Gagliardoni, A Lehmann, G Neven
Annual International Conference on the Theory and Applications of …, 2018
Formal treatment of privacy-enhancing credential systems
J Camenisch, S Krenn, A Lehmann, GL Mikkelsen, G Neven, ...
International Conference on Selected Areas in Cryptography, 3-24, 2015
Sanitizable signatures: How to partially delegate control for authenticated data
C Brzuska, M Fischlin, A Lehmann, D Schröder
BIOSIG 2009: biometrics and electronic signatures, 2009
Electronic identities need private credentials
J Camenisch, A Lehmann, G Neven
IEEE Security & Privacy 10 (1), 80-83, 2012
Public-key encryption with non-interactive opening: New constructions and stronger definitions
D Galindo, B Libert, M Fischlin, G Fuchsbauer, A Lehmann, M Manulis, ...
International Conference on Cryptology in Africa, 333-350, 2010
Security-amplifying combiners for collision-resistant hash functions
M Fischlin, A Lehmann
Annual International Cryptology Conference, 224-243, 2007
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20