Volgen
Christian Matt
Christian Matt
Concordium
Geverifieerd e-mailadres voor concordium.com - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Causal boxes: quantum information-processing systems closed under composition
C Portmann, C Matt, U Maurer, R Renner, B Tackmann
IEEE Transactions on Information Theory 63 (5), 3277-3305, 2017
592017
Indistinguishability obfuscation without multilinear maps: New paradigms via low degree weak pseudorandomness and security amplification
P Ananth, A Jain, H Lin, C Matt, A Sahai
Annual International Cryptology Conference, 284-332, 2019
412019
Augmented secure channels and the goal of the TLS 1.3 record layer
C Badertscher, C Matt, U Maurer, P Rogaway, B Tackmann
International Conference on Provable Security, 85-104, 2015
392015
How to leverage hardness of constant-degree expanding polynomials over to build
A Jain, H Lin, C Matt, A Sahai
Annual International Conference on the Theory and Applications of …, 2019
352019
The one-time pad revisited
C Matt, U Maurer
2013 IEEE International Symposium on Information Theory, 2706-2710, 2013
292013
Afgjort: A partially synchronous finality layer for blockchains
T Dinsdale-Young, B Magri, C Matt, JB Nielsen, D Tschudi
International Conference on Security and Cryptography for Networks, 24-44, 2020
28*2020
Pseudo flawed-smudging generators and their application to indistinguishability obfuscation
H Lin, C Matt
IACR Cryptology ePrint Archive 2018, 646, 2018
282018
Strengthening access control encryption
C Badertscher, C Matt, U Maurer
International Conference on the Theory and Application of Cryptology and …, 2017
202017
Robust authenticated encryption and the limits of symmetric cryptography
C Badertscher, C Matt, U Maurer, P Rogaway, B Tackmann
IMA International Conference on Cryptography and Coding, 112-129, 2015
142015
A definitional framework for functional encryption
C Matt, U Maurer
2015 IEEE 28th Computer Security Foundations Symposium, 217-231, 2015
13*2015
Idealizing identity-based encryption
D Hofheinz, C Matt, U Maurer
International Conference on the Theory and Application of Cryptology and …, 2015
122015
Toward an algebraic theory of systems
C Matt, U Maurer, C Portmann, R Renner, B Tackmann
Theoretical Computer Science 747, 1-25, 2018
52018
GearBox: Optimal-size Shard Committees by Leveraging the Safety-Liveness Dichotomy
B David, B Magri, C Matt, JB Nielsen, D Tschudi
4*2022
Formalizing delayed adaptive corruptions and the security of flooding networks
C Matt, JB Nielsen, SE Thomsen
Cryptology ePrint Archive, 2022
32022
Policy-Compliant Signatures
C Badertscher, C Matt, H Waldner
Theory of Cryptography Conference, 350-381, 2021
12021
Weight-Based Nakamoto-Style Blockchains
SH Kamp, B Magri, C Matt, JB Nielsen, SE Thomsen, D Tschudi
1*2021
Practical Provably Secure Flooding for Blockchains
CD Liu-Zhang, C Matt, U Maurer, G Rito, SE Thomsen
Cryptology ePrint Archive, 2022
2022
A constructive treatment of enhanced encryption schemes
C Matt
ETH Zurich, 2017
2017
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–18