Volgen
Anja Lehmann
Anja Lehmann
Hasso Plattner Institute, University of Potsdam
Geverifieerd e-mailadres voor hpi.de
Titel
Geciteerd door
Geciteerd door
Jaar
Random oracles in a quantum world
D Boneh, Ö Dagdelen, M Fischlin, A Lehmann, C Schaffner, M Zhandry
Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011
4022011
Security of sanitizable signatures revisited
C Brzuska, M Fischlin, T Freudenreich, A Lehmann, M Page, J Schelbert, ...
Public Key Cryptography–PKC 2009: 12th International Conference on Practice …, 2009
1622009
Distributed single sign-on
J Camenisch, Y Gilad, A Lehmann, G Neven
US Patent 9,705,872, 2017
1382017
Unlinkability of sanitizable signatures
C Brzuska, M Fischlin, A Lehmann, D Schröder
Public Key Cryptography–PKC 2010: 13th International Conference on Practice …, 2010
1032010
Anonymous attestation using the strong diffie hellman assumption revisited
J Camenisch, M Drijvers, A Lehmann
Trust and Trustworthy Computing: 9th International Conference, TRUST 2016 …, 2016
922016
Random Oracles with (out) Programmability.
M Fischlin, A Lehmann, T Ristenpart, T Shrimpton, M Stam, S Tessaro
ASIACRYPT 6477, 303-320, 2010
922010
The wonderful world of global random oracles
J Camenisch, M Drijvers, T Gagliardoni, A Lehmann, G Neven
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
722018
Universally composable direct anonymous attestation
J Camenisch, M Drijvers, A Lehmann
Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016
722016
On the joint security of encryption and signature in EMV
JP Degabriele, A Lehmann, KG Paterson, NP Smart, M Strefler
Topics in Cryptology–CT-RSA 2012: The Cryptographers’ Track at the RSA …, 2012
702012
Optimal distributed password verification
J Camenisch, A Lehmann, G Neven
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
592015
One TPM to bind them all: Fixing TPM 2.0 for provably secure anonymous attestation
J Camenisch, L Chen, M Drijvers, A Lehmann, D Novick, R Urian
2017 IEEE Symposium on Security and Privacy (SP), 901-920, 2017
572017
Concepts and languages for privacy-preserving attribute-based authentication
J Camenisch, M Dubovitskaya, A Lehmann, G Neven, C Paquin, ...
Policies and Research in Identity Management: Third IFIP WG 11.6 Working …, 2013
532013
Memento: How to reconstruct your secrets from a single password in a hostile environment
J Camenisch, A Lehmann, A Lysyanskaya, G Neven
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
522014
Formal treatment of privacy-enhancing credential systems
J Camenisch, S Krenn, A Lehmann, GL Mikkelsen, G Neven, ...
Selected Areas in Cryptography–SAC 2015: 22nd International Conference …, 2016
512016
Updatable encryption with post-compromise security
A Lehmann, B Tackmann
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
502018
History-free aggregate message authentication codes
O Eikemeier, M Fischlin, JF Götzmann, A Lehmann, D Schröder, ...
Security and Cryptography for Networks: 7th International Conference, SCN …, 2010
442010
D2. 1 architecture for attribute-based credential technologies
J Camenisch, I Krontiris, A Lehmann, G Neven, C Paquin, K Rannenberg, ...
Deliverable, ABC4Trust EU Project, 2011
422011
Concepts and languages for privacy-preserving attribute-based authentication
J Camenisch, M Dubovitskaya, RR Enderlein, A Lehmann, G Neven, ...
Journal of information security and applications 19 (1), 25-44, 2014
362014
Electronic identities need private credentials
J Camenisch, A Lehmann, G Neven
IEEE Security & Privacy 10 (1), 80-83, 2012
352012
History-free sequential aggregate signatures
M Fischlin, A Lehmann, D Schröder
Security and Cryptography for Networks: 8th International Conference, SCN …, 2012
332012
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20