Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys N Fleischhacker, J Krupp, G Malavolta, J Schneider, D Schröder, ... Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016 | 79 | 2016 |
Limitations of the meta-reduction technique: The case of Schnorr signatures M Fischlin, N Fleischhacker Annual International Conference on the Theory and Applications of …, 2013 | 67 | 2013 |
On tight security proofs for Schnorr signatures N Fleischhacker, T Jager, D Schröder Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014 | 52 | 2014 |
A modular framework for multi-factor authentication and key exchange N Fleischhacker, M Manulis, A Azodi Security Standardisation Research: First International Conference, SSR 2014 …, 2014 | 45* | 2014 |
Group signatures: Authentication with privacy M Manulis, N Fleischhacker, F Günther, F Kiefer, B Poettrering Bundesamt fur Sicherheit in der Informationstechnik, Bonn, Germany, Tech. Rep, 2012 | 40* | 2012 |
Efficient cryptographic password hardening services from partially oblivious commitments J Schneider, N Fleischhacker, D Schröder, M Backes Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 31 | 2016 |
Feasibility and infeasibility of secure computation with malicious PUFs D Dachman-Soled, N Fleischhacker, J Katz, A Lysyanskaya, D Schröder Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014 | 28 | 2014 |
On tight security proofs for Schnorr signatures N Fleischhacker, T Jager, D Schröder Journal of Cryptology 32 (2), 566-599, 2019 | 22 | 2019 |
On the existence of three round zero-knowledge proofs N Fleischhacker, V Goyal, A Jain Annual International Conference on the Theory and Applications of …, 2018 | 22 | 2018 |
Squirrel: efficient synchronized multi-signatures from lattices N Fleischhacker, M Simkin, Z Zhang Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 20 | 2022 |
On statistically secure obfuscation with approximate correctness Z Brakerski, C Brzuska, N Fleischhacker Annual International Cryptology Conference, 551-578, 2016 | 16 | 2016 |
Two-message, oblivious evaluation of cryptographic functionalities N Döttling, N Fleischhacker, J Krupp, D Schröder Annual International Cryptology Conference, 619-648, 2016 | 13 | 2016 |
Property-preserving hash functions for hamming distance from standard assumptions N Fleischhacker, KG Larsen, M Simkin Annual International Conference on the Theory and Applications of …, 2022 | 12 | 2022 |
How to compress encrypted data N Fleischhacker, KG Larsen, M Simkin Annual International Conference on the Theory and Applications of …, 2023 | 10 | 2023 |
Robust property-preserving hash functions for hamming distance and more N Fleischhacker, M Simkin Annual International Conference on the Theory and Applications of …, 2021 | 8 | 2021 |
Chipmunk: Better synchronized multi-signatures from lattices N Fleischhacker, G Herold, M Simkin, Z Zhang Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 6 | 2023 |
SDF—Solar-aware distributed flow in wireless sensor networks I Schweizer, N Fleischhacker, M Mühlhäuser, T Strufe 2011 IEEE 36th Conference on Local Computer Networks, 382-390, 2011 | 6 | 2011 |
Pseudorandom signatures N Fleischhacker, F Günther, F Kiefer, M Manulis, B Poettering Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 5 | 2013 |
Feasibility and infeasibility of secure computation with malicious PUFs D Dachman-Soled, N Fleischhacker, J Katz, A Lysyanskaya, D Schröder Journal of Cryptology 33, 595-617, 2020 | 4 | 2020 |
Interactive non-malleable codes N Fleischhacker, V Goyal, A Jain, A Paskin-Cherniavsky, S Radune Theory of Cryptography: 17th International Conference, TCC 2019, Nuremberg …, 2019 | 3 | 2019 |