Anja Lehmann
Anja Lehmann
Hasso Plattner Institute, University of Potsdam
Geverifieerd e-mailadres voor hpi.de
Titel
Geciteerd door
Geciteerd door
Jaar
Random oracles in a quantum world
D Boneh, Ö Dagdelen, M Fischlin, A Lehmann, C Schaffner, M Zhandry
International Conference on the Theory and Application of Cryptology and …, 2011
2162011
Security of sanitizable signatures revisited
C Brzuska, M Fischlin, T Freudenreich, A Lehmann, M Page, J Schelbert, ...
International Workshop on Public Key Cryptography, 317-336, 2009
1362009
Unlinkability of sanitizable signatures
C Brzuska, M Fischlin, A Lehmann, D Schröder
International Workshop on Public Key Cryptography, 444-461, 2010
872010
Random oracles with (out) programmability
M Fischlin, A Lehmann, T Ristenpart, T Shrimpton, M Stam, S Tessaro
International Conference on the Theory and Application of Cryptology and …, 2010
662010
On the joint security of encryption and signature in EMV
JP Degabriele, A Lehmann, KG Paterson, NP Smart, M Strefler
Cryptographers’ Track at the RSA Conference, 116-135, 2012
542012
Concepts and languages for privacy-preserving attribute-based authentication
J Camenisch, M Dubovitskaya, A Lehmann, G Neven, C Paquin, ...
IFIP Working Conference on Policies and Research in Identity Management, 34-52, 2013
452013
D2. 1 architecture for attribute-based credential technologies
J Camenisch, I Krontiris, A Lehmann, G Neven, C Paquin, K Rannenberg, ...
Deliverable, ABC4Trust EU Project (December 2011), 2011
422011
Anonymous attestation using the strong diffie hellman assumption revisited
J Camenisch, M Drijvers, A Lehmann
International Conference on Trust and Trustworthy Computing, 1-20, 2016
402016
Optimal distributed password verification
J Camenisch, A Lehmann, G Neven
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
372015
Universally composable direct anonymous attestation
J Camenisch, M Drijvers, A Lehmann
Public-Key Cryptography--PKC 2016, 234-264, 2016
352016
Memento: How to reconstruct your secrets from a single password in a hostile environment
J Camenisch, A Lehmann, A Lysyanskaya, G Neven
Annual Cryptology Conference, 256-275, 2014
342014
Public-key encryption with non-interactive opening: New constructions and stronger definitions
D Galindo, B Libert, M Fischlin, G Fuchsbauer, A Lehmann, M Manulis, ...
International Conference on Cryptology in Africa, 333-350, 2010
322010
One TPM to bind them all: Fixing TPM 2.0 for provably secure anonymous attestation
J Camenisch, L Chen, M Drijvers, A Lehmann, D Novick, R Urian
2017 IEEE Symposium on Security and Privacy (SP), 901-920, 2017
302017
Formal treatment of privacy-enhancing credential systems
J Camenisch, S Krenn, A Lehmann, GL Mikkelsen, G Neven, ...
International Conference on Selected Areas in Cryptography, 3-24, 2015
292015
Electronic identities need private credentials
J Camenisch, A Lehmann, G Neven
IEEE Security & Privacy 10 (1), 80-83, 2012
292012
History-free aggregate message authentication codes
O Eikemeier, M Fischlin, JF Götzmann, A Lehmann, D Schröder, ...
International Conference on Security and Cryptography for Networks, 309-328, 2010
292010
Sanitizable signatures: How to partially delegate control for authenticated data
C Brzuska, M Fischlin, A Lehmann, D Schröder
BIOSIG 2009: biometrics and electronic signatures, 2009
292009
Robust multi-property combiners for hash functions revisited
M Fischlin, A Lehmann, K Pietrzak
International Colloquium on Automata, Languages, and Programming, 655-666, 2008
252008
The wonderful world of global random oracles
J Camenisch, M Drijvers, T Gagliardoni, A Lehmann, G Neven
Annual International Conference on the Theory and Applications of …, 2018
242018
Security-amplifying combiners for collision-resistant hash functions
M Fischlin, A Lehmann
Annual International Cryptology Conference, 224-243, 2007
24*2007
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20