Stop the war!
Остановите войну!
for scientists:
default search action
Stephan Krenn
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j6]Jesús García Rodríguez, Stephan Krenn, Jorge Bernal Bernabé, Antonio F. Skarmeta:
Beyond selective disclosure: Extending distributed p-ABC implementations by commit-and-prove techniques. Comput. Networks 248: 110498 (2024) - [j5]Jesús García Rodríguez, Stephan Krenn, Daniel Slamanig:
To pass or not to pass: Privacy-preserving physical access control. Comput. Secur. 136: 103566 (2024) - [c51]Markus Wurzenberger, Stephan Krenn, Max Landauer, Florian Skopik, Cora Perner, Jarno Lötjönen, Jani Päijänen, Georgios Gardikis, Nikos Alabasis, Liisa Sakerman, Kristiina Omri, Juha Röning, Kimmo Halunen, Vincent Thouvenot, Martin Weise, Andreas Rauber, Vasileios Gkioulos, Sokratis K. Katsikas, Luigi Sabetta, Jacopo Bonato, Rocío Ortíz, Daniel Navarro, Nikolaos Stamatelatos, Ioannis Avdoulas, Rudolf Mayer, Andreas Ekelhart, Ioannis Giannoulakis, Emmanouil Kafetzakis, Antonello Corsi, Ulrike Lechner, Corinna Schmitt:
NEWSROOM: Towards Automating Cyber Situational Awareness Processes and Tools for Cyber Defence. ARES 2024: 69:1-69:11 - [c50]Veronika Siska, Thomas Lorünser, Stephan Krenn, Christoph Fabianek:
Integrating Secure Multiparty Computation into Data Spaces. CLOSER 2024: 346-357 - 2023
- [j4]Thomas Lorünser, Stephan Krenn, Christoph Pacher, Bernhard Schrenk:
On the Security of Offloading Post-Processing for Quantum Key Distribution. Entropy 25(2): 226 (2023) - [c49]Stephan Krenn, Jan Orlicky, Daniel Slamanig, Tomas Trpisovský:
RiBAC: Strengthening Access Control Systems for Pandemic Risk Reduction while Preserving Privacy. ARES 2023: 123:1-123:9 - [i39]Stephan Krenn, Thomas Lorünser, Sebastian Ramacher, Florian Wohner:
Outsourced Computations Maintaining Confidentiality and Authenticity. ERCIM News 2023(133) (2023) - [i38]Jesús García Rodríguez, Stephan Krenn, Daniel Slamanig:
To Pass or Not to Pass: Privacy-Preserving Physical Access Control. IACR Cryptol. ePrint Arch. 2023: 934 (2023) - 2022
- [c48]Thomas Lorünser, Florian Wohner, Stephan Krenn:
A Verifiable Multiparty Computation Solver for the Linear Assignment Problem: And Applications to Air Traffic Management. CCSW 2022: 41-51 - [c47]Karl Koch, Stephan Krenn, Tilen Marc, Stefan More, Sebastian Ramacher:
KRAKEN: a privacy-preserving data market for authentic data. DE@CoNEXT 2022: 15-20 - [c46]Thomas Lorünser, Florian Wohner, Stephan Krenn:
A Privacy-Preserving Auction Platform with Public Verifiability for Smart Manufacturing. ICISSP 2022: 637-647 - [c45]Abida Haque, Stephan Krenn, Daniel Slamanig, Christoph Striecks:
Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model. Public Key Cryptography (2) 2022: 437-467 - [c44]Jesús García Rodríguez, David Goodman, Stephan Krenn, Vasia Liagkou, Rafael Torres Moreno:
From Research to Privacy-Preserving Industry Applications - Workshop Summary. Privacy and Identity Management 2022: 21-33 - [p3]Silvia Gabrielli, Stephan Krenn, Donato Pellegrino, Juan Carlos Pérez Baún, Pilar Perez Berganza, Sebastian Ramacher, Wim Vandevelde:
KRAKEN: A Secure, Trusted, Regulatory-Compliant, and Privacy-Preserving Data Sharing Platform. Data Spaces 2022: 107-130 - [e6]Michael Friedewald, Stephan Krenn, Ina Schiering, Stefan Schiffner:
Privacy and Identity Management. Between Data Protection and Security - 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2021, Virtual Event, August 16-20, 2021, Revised Selected Papers. IFIP Advances in Information and Communication Technology 644, Springer 2022, ISBN 978-3-030-99099-2 [contents] - [i37]Thomas Lorünser, Florian Wohner, Stephan Krenn:
A Verifiable Multiparty Computation Solver for the Assignment Problem and Applications to Air Traffic Management. CoRR abs/2205.03048 (2022) - [i36]Stephan Krenn, Thomas Lorünser:
Single-Use Delegatable Signatures Based on Smart Contracts. CoRR abs/2210.02826 (2022) - [i35]Thomas Lorünser, Stephan Krenn, Christoph Pacher, Bernhard Schrenk:
On the Security of Offloading Post-Processing for Quantum Key Distribution. CoRR abs/2210.08977 (2022) - [i34]Jan Bobolz, Fabian Eidens, Stephan Krenn, Sebastian Ramacher, Kai Samelin:
Issuer-Hiding Attribute-Based Credentials. IACR Cryptol. ePrint Arch. 2022: 213 (2022) - 2021
- [c43]Stephan Krenn, Thomas Lorünser:
Single-Use Delegatable Signatures Based on Smart Contracts. ARES 2021: 40:1-40:7 - [c42]Jan Bobolz, Fabian Eidens, Stephan Krenn, Sebastian Ramacher, Kai Samelin:
Issuer-Hiding Attribute-Based Credentials. CANS 2021: 158-178 - [c41]Jorge Bernal Bernabé, Jesús García Rodríguez, Stephan Krenn, Vasia Liagkou, Antonio F. Skarmeta, Rafael Torres:
Privacy-Preserving Identity Management and Applications to Academic Degree Verification. Privacy and Identity Management 2021: 33-46 - [e5]Mauro Conti, Marc Stevens, Stephan Krenn:
Cryptology and Network Security - 20th International Conference, CANS 2021, Vienna, Austria, December 13-15, 2021, Proceedings. Lecture Notes in Computer Science 13099, Springer 2021, ISBN 978-3-030-92547-5 [contents] - [e4]Michael Friedewald, Stefan Schiffner, Stephan Krenn:
Privacy and Identity Management: 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Maribor, Slovenia, September 21-23, 2020, Revised Selected Papers. IFIP Advances in Information and Communication Technology 619, Springer 2021, ISBN 978-3-030-72465-8 [contents] - [i33]Karl Koch, Stephan Krenn, Donato Pellegrino, Sebastian Ramacher:
Privacy-preserving Analytics for Data Markets using MPC. CoRR abs/2103.03739 (2021) - 2020
- [j3]Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
Fully invisible protean signatures schemes. IET Inf. Secur. 14(3): 266-285 (2020) - [c40]Jan Bobolz, Fabian Eidens, Stephan Krenn, Daniel Slamanig, Christoph Striecks:
Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection. AsiaCCS 2020: 319-333 - [c39]Karl Koch, Stephan Krenn, Donato Pellegrino, Sebastian Ramacher:
Privacy-Preserving Analytics for Data Markets Using MPC. Privacy and Identity Management 2020: 226-246 - [c38]David Derler, Stephan Krenn, Kai Samelin, Daniel Slamanig:
Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-quantum Assumptions. SCN 2020: 427-447 - [e3]Stephan Krenn, Haya Schulmann, Serge Vaudenay:
Cryptology and Network Security - 19th International Conference, CANS 2020, Vienna, Austria, December 14-16, 2020, Proceedings. Lecture Notes in Computer Science 12579, Springer 2020, ISBN 978-3-030-65410-8 [contents] - [e2]Michael Friedewald, Melek Önen, Eva Lievens, Stephan Krenn, Samuel Fricker:
Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19-23, 2019, Revised Selected Papers. IFIP Advances in Information and Communication Technology 576, Springer 2020, ISBN 978-3-030-42503-6 [contents] - [i32]Stefan Ruehrup, Stephan Krenn:
Towards Privacy in Geographic Message Dissemination for Connected Vehicles. CoRR abs/2011.02309 (2020) - [i31]Jan Bobolz, Fabian Eidens, Stephan Krenn, Daniel Slamanig, Christoph Striecks:
Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection. IACR Cryptol. ePrint Arch. 2020: 382 (2020) - [i30]Abida Haque, Stephan Krenn, Daniel Slamanig, Christoph Striecks:
Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model. IACR Cryptol. ePrint Arch. 2020: 683 (2020) - [i29]David Derler, Stephan Krenn, Kai Samelin, Daniel Slamanig:
Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-Quantum Assumptions. IACR Cryptol. ePrint Arch. 2020: 1084 (2020)
2010 – 2019
- 2019
- [c37]Stephan Krenn, Kai Samelin, Christoph Striecks:
Practical Group-Signatures with Privacy-Friendly Openings. ARES 2019: 10:1-10:10 - [c36]Jan Camenisch, Stephan Krenn, Ralf Küsters, Daniel Rausch:
iUC: Flexible Universal Composability Made Simple. ASIACRYPT (3) 2019: 191-221 - [c35]Ulrich Haböck, Stephan Krenn:
Breaking and Fixing Anonymous Credentials for the Cloud. CANS 2019: 249-269 - [c34]Stefan Ruehrup, Stephan Krenn:
Towards Privacy in Geographic Message Dissemination for Connected Vehicles. ICCVE 2019: 1-6 - [e1]Eleni Kosta, Jo Pierson, Daniel Slamanig, Simone Fischer-Hübner, Stephan Krenn:
Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data - 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Vienna, Austria, August 20-24, 2018, Revised Selected Papers. IFIP Advances in Information and Communication Technology 547, Springer 2019, ISBN 978-3-030-16743-1 [contents] - [i28]Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
Fully Invisible Protean Signatures Schemes. IACR Cryptol. ePrint Arch. 2019: 39 (2019) - [i27]Stephan Krenn, Kai Samelin, Christoph Striecks:
Practical Group-Signatures with Privacy-Friendly Openings. IACR Cryptol. ePrint Arch. 2019: 81 (2019) - [i26]Ulrich Haböck, Stephan Krenn:
Breaking and Fixing Anonymous Credentials for the Cloud (Full Version). IACR Cryptol. ePrint Arch. 2019: 1061 (2019) - [i25]Jan Camenisch, Stephan Krenn, Ralf Küsters, Daniel Rausch:
iUC: Flexible Universal Composability Made Simple. IACR Cryptol. ePrint Arch. 2019: 1073 (2019) - 2018
- [c33]Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications. AFRICACRYPT 2018: 11-32 - [c32]Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
Protean Signature Schemes. CANS 2018: 256-276 - [c31]David Derler, Stephan Krenn, Thomas Lorünser, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks:
Revisiting Proxy Re-encryption: Forward Secrecy, Improved Security, and Applications. Public Key Cryptography (1) 2018: 219-250 - [i24]Stephan Krenn, Thomas Lorünser, Christoph Striecks:
Engineering Cryptography for Security and Privacy in the Cloud. ERCIM News 2018(113) (2018) - [i23]Justina Bieliauskaite, Agi Karyda, Stephan Krenn, Erkuden Rios, George Suciu Jr.:
TRUSTEE - Data Privacy and Cloud Security Cluster Europe. ERCIM News 2018(114) (2018) - [i22]David Derler, Stephan Krenn, Thomas Lorünser, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks:
Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications. IACR Cryptol. ePrint Arch. 2018: 321 (2018) - [i21]Stephan Krenn, Kai Samelin, Dieter Sommer:
Stronger Security for Sanitizable Signatures. IACR Cryptol. ePrint Arch. 2018: 858 (2018) - [i20]Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
Protean Signature Schemes. IACR Cryptol. ePrint Arch. 2018: 970 (2018) - [i19]Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications. IACR Cryptol. ePrint Arch. 2018: 971 (2018) - 2017
- [j2]Thomas Lorünser, Stephan Krenn, Christoph Striecks, Thomas Länger:
Agile cryptographic solutions for the cloud. Elektrotech. Informationstechnik 134(7): 364-369 (2017) - [c30]Alexandros Kostopoulos, Evangelos Sfakianakis, Ioannis P. Chochliouros, John Sören Pettersson, Stephan Krenn, Welderufael Tesfay, Andrea Migliavacca, Felix Hörandner:
Towards the Adoption of Secure Cloud Identity Services. ARES 2017: 90:1-90:7 - [c29]Michael Till Beck, Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures. ACISP (1) 2017: 437-452 - [c28]Stephan Krenn, Thomas Lorünser, Anja Salzer, Christoph Striecks:
Towards Attribute-Based Credentials in the Cloud. CANS 2017: 179-202 - [c27]Stephan Krenn, Thomas Lorünser, Christoph Striecks:
Batch-verifiable Secret Sharing with Unconditional Privacy. ICISSP 2017: 303-311 - [c26]Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
Chameleon-Hashes with Ephemeral Trapdoors - And Applications to Invisible Sanitizable Signatures. Public Key Cryptography (2) 2017: 152-182 - [c25]Pasquale Chiaro, Simone Fischer-Hübner, Thomas Groß, Stephan Krenn, Thomas Lorünser, Ana Isabel Martínez Garcí, Andrea Migliavacca, Kai Rannenberg, Daniel Slamanig, Christoph Striecks, Alberto Zanini:
Secure and Privacy-Friendly Storage and Data Processing in the Cloud. Privacy and Identity Management 2017: 153-169 - [i18]Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures. IACR Cryptol. ePrint Arch. 2017: 11 (2017) - [i17]Michael Till Beck, Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures. IACR Cryptol. ePrint Arch. 2017: 445 (2017) - 2016
- [j1]Stephan Krenn, Krzysztof Pietrzak, Akshay Wadia, Daniel Wichs:
A counterexample to the chain rule for conditional HILL entropy. Comput. Complex. 25(3): 567-605 (2016) - [c24]Denise Demirel, Stephan Krenn, Thomas Lorünser, Giulia Traverso:
Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System. ARES 2016: 88-97 - [c23]Felix Hörandner, Stephan Krenn, Andrea Migliavacca, Florian Thiemer, Bernd Zwattendorfer:
CREDENTIAL: A Framework for Privacy-Preserving Cloud-Based Data Sharing. ARES 2016: 742-749 - [c22]Jan Camenisch, Robert R. Enderlein, Stephan Krenn, Ralf Küsters, Daniel Rausch:
Universal Composition with Responsive Environments. ASIACRYPT (2) 2016: 807-840 - [c21]David Derler, Stephan Krenn, Daniel Slamanig:
Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing. CANS 2016: 211-227 - [c20]Farzaneh Karegar, Christoph Striecks, Stephan Krenn, Felix Hörandner, Thomas Lorünser, Simone Fischer-Hübner:
Opportunities and Challenges of CREDENTIAL - Towards a Metadata-Privacy Respecting Identity Provider. Privacy and Identity Management 2016: 76-91 - [c19]Andreas Happe, Stephan Krenn, Thomas Lorünser:
Malicious Clients in Distributed Secret Sharing Based Storage Networks. Security Protocols Workshop 2016: 206-214 - [c18]Michael Till Beck, Stephan Krenn, Franz-Stefan Preiss, Kai Samelin:
Practical Signing-Right Revocation. TRUST 2016: 21-39 - [i16]Bernd Zwattendorfer, Stephan Krenn, Thomas Lorünser:
Secure and Privacy-Preserving Identity Management in the Cloud. ERCIM News 2016(104) (2016) - [i15]Nicolás Notario, Stephan Krenn, Bernd Zwattendorfer, Felix Hörandner:
CREDENTIAL: Secure Cloud Identity Wallet. ERCIM News 2016(106) (2016) - [i14]Jan Camenisch, Robert R. Enderlein, Stephan Krenn, Ralf Küsters, Daniel Rausch:
Universal Composition with Responsive Environments. IACR Cryptol. ePrint Arch. 2016: 34 (2016) - [i13]David Derler, Stephan Krenn, Daniel Slamanig:
Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing. IACR Cryptol. ePrint Arch. 2016: 1064 (2016) - 2015
- [c17]Foteini Baldimtsi, Jan Camenisch, Lucjan Hanzlik, Stephan Krenn, Anja Lehmann, Gregory Neven:
Recovering Lost Device-Bound Credentials. ACNS 2015: 307-327 - [c16]Stephan Krenn, Kai Samelin, Dieter Sommer:
Stronger Security for Sanitizable Signatures. DPM/QASA@ESORICS 2015: 100-117 - [c15]Fabrice Benhamouda, Stephan Krenn, Vadim Lyubashevsky, Krzysztof Pietrzak:
Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Rings. ESORICS (1) 2015: 305-325 - [c14]Jan Camenisch, Stephan Krenn, Anja Lehmann, Gert Læssøe Mikkelsen, Gregory Neven, Michael Østergaard Pedersen:
Formal Treatment of Privacy-Enhancing Credential Systems. SAC 2015: 3-24 - [p2]Patrik Bichsel, Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Stephan Krenn, Ioannis Krontiris, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss, Kai Rannenberg, Ahmad Sabouri:
An Architecture for Privacy-ABCs. Attribute-based Credentials for Trust 2015: 11-78 - [p1]Patrik Bichsel, Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Stephan Krenn, Anja Lehmann, Gregory Neven, Franz-Stefan Preiss:
Cryptographic Protocols Underlying Privacy-ABCs. Attribute-based Credentials for Trust 2015: 79-108 - 2014
- [c13]Fabrice Benhamouda, Jan Camenisch, Stephan Krenn, Vadim Lyubashevsky, Gregory Neven:
Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group Signatures. ASIACRYPT (1) 2014: 551-572 - [i12]Stephan Krenn, Krzysztof Pietrzak, Akshay Wadia, Daniel Wichs:
A Counterexample to the Chain Rule for Conditional HILL Entropy. IACR Cryptol. ePrint Arch. 2014: 678 (2014) - [i11]Jan Camenisch, Stephan Krenn, Anja Lehmann, Gert Læssøe Mikkelsen, Gregory Neven, Michael Østergaard Pedersen:
Formal Treatment of Privacy-Enhancing Credential Systems. IACR Cryptol. ePrint Arch. 2014: 708 (2014) - [i10]Fabrice Benhamouda, Stephan Krenn, Vadim Lyubashevsky, Krzysztof Pietrzak:
Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings. IACR Cryptol. ePrint Arch. 2014: 889 (2014) - 2013
- [c12]Joël Alwen, Stephan Krenn, Krzysztof Pietrzak, Daniel Wichs:
Learning with Rounding, Revisited - New Reduction, Properties and Applications. CRYPTO (1) 2013: 57-74 - [c11]Stephan Krenn, Krzysztof Pietrzak, Akshay Wadia:
A Counterexample to the Chain Rule for Conditional HILL Entropy - And What Deniable Encryption Has to Do with It. TCC 2013: 23-39 - [i9]Joël Alwen, Stephan Krenn, Krzysztof Pietrzak, Daniel Wichs:
Learning with Rounding, Revisited: New Reduction, Properties and Applications. IACR Cryptol. ePrint Arch. 2013: 98 (2013) - 2012
- [b1]Stephan Krenn:
Bringing zero-knowledge proofs of knowledge to practice. University of Fribourg, Logos 2012, ISBN 978-3-8325-3217-8, pp. 1-147 - [c10]Abhishek Jain, Stephan Krenn, Krzysztof Pietrzak, Aris Tentes:
Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise. ASIACRYPT 2012: 663-680 - [c9]José Bacelar Almeida, Manuel Barbosa, Endre Bangerter, Gilles Barthe, Stephan Krenn, Santiago Zanella Béguelin:
Full proof cryptography: verifiable compilation of efficient zero-knowledge protocols. CCS 2012: 488-500 - [i8]José Bacelar Almeida, Manuel Barbosa, Endre Bangerter, Gilles Barthe, Stephan Krenn, Santiago Zanella Béguelin:
Full Proof Cryptography: Verifiable Compilation of Efficient Zero-Knowledge Protocols. IACR Cryptol. ePrint Arch. 2012: 258 (2012) - [i7]Abhishek Jain, Stephan Krenn, Krzysztof Pietrzak, Aris Tentes:
Commitments and Efficient Zero-Knowledge Proofs from Hard Learning Problems. IACR Cryptol. ePrint Arch. 2012: 513 (2012) - 2011
- [c8]Jan Camenisch, Stephan Krenn, Victor Shoup:
A Framework for Practical Universally Composable Zero-Knowledge Protocols. ASIACRYPT 2011: 449-467 - [c7]Endre Bangerter, Stephan Krenn, Matrial Seifriz, Ulrich Ultes-Nitsche:
cPLC - A Cryptographic Programming Language and Compiler. ISSA 2011 - [c6]David Gullasch, Endre Bangerter, Stephan Krenn:
Cache Games - Bringing Access-Based Cache Attacks on AES to Practice. IEEE Symposium on Security and Privacy 2011: 490-505 - [i6]Jan Camenisch, Stephan Krenn, Victor Shoup:
A Framework for Practical Universally Composable Zero-Knowledge Protocols. IACR Cryptol. ePrint Arch. 2011: 228 (2011) - 2010
- [c5]José Bacelar Almeida, Endre Bangerter, Manuel Barbosa, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider:
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols. ESORICS 2010: 151-167 - [c4]Endre Bangerter, Jan Camenisch, Stephan Krenn:
Efficiency Limitations for Σ-Protocols for Group Homomorphisms. TCC 2010: 553-571 - [i5]José Bacelar Almeida, Endre Bangerter, Manuel Barbosa, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider:
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols. IACR Cryptol. ePrint Arch. 2010: 339 (2010) - [i4]Endre Bangerter, David Gullasch, Stephan Krenn:
Cache Games - Bringing Access Based Cache Attacks on AES to Practice. IACR Cryptol. ePrint Arch. 2010: 594 (2010)
2000 – 2009
- 2009
- [c3]Endre Bangerter, Thomas Briner, Wilko Henecka, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider:
Automatic Generation of Sigma-Protocols. EuroPKI 2009: 67-82 - [c2]Endre Bangerter, Stefania Barzan, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider, Joe-Kai Tsay:
Bringing Zero-Knowledge Proofs of Knowledge to Practice. Security Protocols Workshop 2009: 51-62 - [c1]Stephan Krenn:
Bringing Zero-Knowledge Proofs of Knowledge to Practice. Security Protocols Workshop 2009: 63-68 - [i3]Endre Bangerter, Stefania Barzan, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider, Joe-Kai Tsay:
Bringing Zero-Knowledge Proofs of Knowledge to Practice. IACR Cryptol. ePrint Arch. 2009: 211 (2009) - [i2]Endre Bangerter, Jan Camenisch, Stephan Krenn:
Efficiency Limitations for Sigma-Protocols for Group Homomorphisms. IACR Cryptol. ePrint Arch. 2009: 595 (2009) - 2008
- [i1]Endre Bangerter, Jan Camenisch, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider:
Automatic Generation of Sound Zero-Knowledge Protocols. IACR Cryptol. ePrint Arch. 2008: 471 (2008)