Volgen
Eike Kiltz
Eike Kiltz
Professor of Computer Science, Ruhr-Universität Bochum
Geverifieerd e-mailadres voor rub.de - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ...
Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005
11232005
Bonsai trees, or how to delegate a lattice basis
D Cash, D Hofheinz, E Kiltz, C Peikert
Journal of cryptology 25 (4), 601-639, 2012
10172012
CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM
J Bos, L Ducas, E Kiltz, T Lepoint, V Lyubashevsky, JM Schanck, ...
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 353-367, 2018
5502018
Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation
I Damgård, M Fitzi, E Kiltz, JB Nielsen, T Toft
Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006 …, 2006
5162006
A modular analysis of the Fujisaki-Okamoto transformation
D Hofheinz, K Hövelmanns, E Kiltz
Theory of Cryptography: 15th International Conference, TCC 2017, Baltimore …, 2017
4382017
The twin Diffie-Hellman problem and applications
D Cash, E Kiltz, V Shoup
Advances in Cryptology–EUROCRYPT 2008: 27th Annual International Conference …, 2008
3592008
An algebraic framework for Diffie–Hellman assumptions
A Escala, G Herold, E Kiltz, C Ràfols, J Villar
Journal of cryptology 30, 242-288, 2017
3402017
Secure hybrid encryption from weakened key encapsulation
D Hofheinz, E Kiltz
Advances in Cryptology-CRYPTO 2007: 27th Annual International Cryptology …, 2007
3322007
Chosen-ciphertext security from tag-based encryption
E Kiltz
Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006 …, 2006
3042006
Crystals-dilithium: A lattice-based digital signature scheme
L Ducas, E Kiltz, T Lepoint, V Lyubashevsky, P Schwabe, G Seiler, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems, 238-268, 2018
2882018
More constructions of lossy and correlation-secure trapdoor functions
DM Freeman, O Goldreich, E Kiltz, A Rosen, G Segev
Journal of cryptology 26, 39-74, 2013
1782013
The algebraic group model and its applications
G Fuchsbauer, E Kiltz, J Loss
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
1752018
Leakage-resilient signatures
S Faust, E Kiltz, K Pietrzak, GN Rothblum
Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010
1732010
Practical chosen ciphertext secure encryption from factoring
D Hofheinz, E Kiltz, V Shoup
Journal of cryptology 26 (1), 102-118, 2013
1592013
Programmable hash functions and their applications
D Hofheinz, E Kiltz
Advances in Cryptology–CRYPTO 2008: 28th Annual International Cryptology …, 2008
1592008
On the generic construction of identity-based signatures with additional properties
D Galindo, J Herranz, E Kiltz
Advances in Cryptology–ASIACRYPT 2006: 12th International Conference on the …, 2006
1462006
A concrete treatment of Fiat-Shamir signatures in the quantum random-oracle model
E Kiltz, V Lyubashevsky, C Schaffner
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
1432018
Chosen-ciphertext secure key-encapsulation based on gap hashed Diffie-Hellman
E Kiltz
Public Key Cryptography–PKC 2007: 10th International Conference on Practice …, 2007
1392007
Leakage resilient elgamal encryption
E Kiltz, K Pietrzak
Advances in Cryptology-ASIACRYPT 2010: 16th International Conference on the …, 2010
1312010
CRYSTALS-Kyber algorithm specifications and supporting documentation
R Avanzi, J Bos, L Ducas, E Kiltz, T Lepoint, V Lyubashevsky, JM Schanck, ...
NIST PQC Round 2 (4), 1-43, 2017
1302017
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20