Stephan Krenn
Stephan Krenn
Geverifieerd e-mailadres voor ait.ac.at
Titel
Geciteerd door
Geciteerd door
Jaar
Cache games--bringing access-based cache attacks on AES to practice
D Gullasch, E Bangerter, S Krenn
2011 IEEE Symposium on Security and Privacy, 490-505, 2011
4372011
Learning with Rounding, Revisited: New Reduction, Properties and Applications
J Alwen, S Krenn, K Pietrzak, D Wichs
Advances in Cryptology–CRYPTO 2013, 2013
115*2013
Better zero-knowledge proofs for lattice encryption and their application to group signatures
F Benhamouda, J Camenisch, S Krenn, V Lyubashevsky, G Neven
International Conference on the Theory and Application of Cryptology and …, 2014
732014
Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise
A Jain, S Krenn, K Pietrzak, A Tentes
692011
Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings
F Benhamouda, S Krenn, V Lyubashevsky, K Pietrzak
European Symposium on Research in Computer Science - ESORICS, 2015
592015
A certifying compiler for zero-knowledge proofs of knowledge based on Σ-protocols
JB Almeida, E Bangerter, M Barbosa, S Krenn, AR Sadeghi, T Schneider
European Symposium on Research in Computer Security, 151-167, 2010
512010
A framework for practical universally composable zero-knowledge protocols
J Camenisch, S Krenn, V Shoup
International Conference on the Theory and Application of Cryptology and …, 2011
442011
Chameleon-hashes with ephemeral trapdoors
J Camenisch, D Derler, S Krenn, HC Pöhls, K Samelin, D Slamanig
IACR International Workshop on Public Key Cryptography, 152-182, 2017
372017
Full proof cryptography: verifiable compilation of efficient zero-knowledge protocols
J Bacelar Almeida, M Barbosa, E Bangerter, G Barthe, S Krenn, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
372012
Universal composition with responsive environments
J Camenisch, RR Enderlein, S Krenn, R Küsters, D Rausch
International Conference on the Theory and Application of Cryptology and …, 2016
292016
Formal Treatment of Privacy-Enhancing Credential Systems
J Camenisch, S Krenn, A Lehmann, GL Mikkelsen, G Neven, ...
https://eprint.iacr.org/, 2014
292014
Automatic Generation of Sound Zero-Knowledge Protocols.
E Bangerter, J Camenisch, S Krenn, AR Sadeghi, T Schneider
IACR Cryptology ePrint Archive 2008, 471, 2008
292008
CREDENTIAL: a framework for privacy-preserving cloud-based data sharing
F Hörandner, S Krenn, A Migliavacca, F Thiemer, B Zwattendorfer
2016 11th International Conference on Availability, Reliability and Security …, 2016
232016
Architecture for Attribute-based Credential Technologies
P Bichsel, J Camenisch, M Dubovitskaya, RR Enderlein, S Krenn, ...
ABC4Trust - Deliverable to the European Commision, 2014
22*2014
Automatic generation of sigma-protocols
E Bangerter, T Briner, W Henecka, S Krenn, AR Sadeghi, T Schneider
European Public Key Infrastructure Workshop, 67-82, 2009
202009
Bringing Zero-Knowledge Proofs of Knowledge to Practice
S Krenn
Security Protocols XVII, 63-68, 2009
18*2009
A counterexample to the chain rule for conditional HILL entropy
S Krenn, K Pietrzak, A Wadia
Theory of Cryptography Conference, 23-39, 2013
152013
Efficiency limitations for Σ-protocols for group homomorphisms
E Bangerter, J Camenisch, S Krenn
Theory of Cryptography Conference, 553-571, 2010
152010
On the design and implementation of efficient zero-knowledge proofs of knowledge
E Bangerter, S Krenn, AR Sadeghi, T Schneider, JK Tsay
Software Performance Enhancements for Encryption and Decryption and …, 2009
152009
Revisiting proxy re-encryption: Forward secrecy, improved security, and applications
D Derler, S Krenn, T Lorünser, S Ramacher, D Slamanig, C Striecks
IACR International Workshop on Public Key Cryptography, 219-250, 2018
142018
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20