TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 8.

Nielsen, Jesper Buus and Schneider, Thomas and Trifiletti, Roberto (2017):
Constant Round Maliciously Secure 2PC with Function-Independent Preprocessing using LEGO.
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17), Internet Society, DOI: 10.14722/ndss.2017.23075,
[Online-Edition: https://encrypto.de/papers/NST17.pdf],
[Conference or Workshop Item]

Faust, Sebastian and Hazay, Carmit and Nielsen, Jesper Buus and Nordholt, Peter Sebastian and Zottarel, Angela (2016):
Signature Schemes Secure Against Hard-to-Invert Leakage.
In: J. Cryptology, pp. 422-455, 29, (2), DOI: 10.1007/s00145-015-9197-1,
[Online-Edition: https://doi.org/10.1007/s00145-015-9197-1],
[Article]

Faust, Sebastian and Mukherjee, Pratyay and Nielsen, Jesper Buus and Venturi, Daniele (2015):
A Tamper and Leakage Resilient von Neumann Architecture.
In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, DOI: 10.1007/978-3-662-46447-2₂₆,
[Online-Edition: https://doi.org/10.1007/978-3-662-46447-2_26],
[Conference or Workshop Item]

Faust, Sebastian and Mukherjee, Pratyay and Nielsen, Jesper Buus and Venturi, Daniele (2014):
Continuous Non-malleable Codes.
In: IACR Cryptology ePrint Archive, p. 173, 2014, [Online-Edition: http://eprint.iacr.org/2014/173],
[Article]

Faust, Sebastian and Mukherjee, Pratyay and Nielsen, Jesper Buus and Venturi, Daniele (2014):
Continuous Non-malleable Codes.
In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, DOI: 10.1007/978-3-642-54242-8₂₀,
[Online-Edition: https://doi.org/10.1007/978-3-642-54242-8_20],
[Conference or Workshop Item]

Faust, Sebastian and Mukherjee, Pratyay and Nielsen, Jesper Buus and Venturi, Daniele (2014):
A Tamper and Leakage Resilient Random Access Machine.
In: IACR Cryptology ePrint Archive, p. 338, 2014, [Online-Edition: http://eprint.iacr.org/2014/338],
[Article]

Faust, Sebastian and Hazay, Carmit and Nielsen, Jesper Buus and Nordholt, Peter Sebastian and Zottarel, Angela (2012):
Signature Schemes Secure against Hard-to-Invert Leakage.
In: IACR Cryptology ePrint Archive, p. 45, 2012, [Online-Edition: http://eprint.iacr.org/2012/045],
[Article]

Faust, Sebastian and Hazay, Carmit and Nielsen, Jesper Buus and Nordholt, Peter Sebastian and Zottarel, Angela (2012):
Signature Schemes Secure against Hard-to-Invert Leakage.
In: Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings, DOI: 10.1007/978-3-642-34961-4₈,
[Online-Edition: https://doi.org/10.1007/978-3-642-34961-4_8],
[Conference or Workshop Item]

This list was generated on Tue Oct 15 01:50:21 2019 CEST.