Token meets wallet: Formalizing privacy and revocation for FIDO2 L Hanzlik, J Loss, B Wagner 2023 IEEE Symposium on Security and Privacy (SP), 1491-1508, 2023 | 25 | 2023 |
PI-cut-choo and friends: Compact blind signatures via parallel instance cut-and-choose and more R Chairattana-Apirom, L Hanzlik, J Loss, A Lysyanskaya, B Wagner Annual International Cryptology Conference, 3-31, 2022 | 21 | 2022 |
Chopsticks: Fork-free two-round multi-signatures from non-interactive assumptions J Pan, B Wagner Annual International Conference on the Theory and Applications of …, 2023 | 17 | 2023 |
Lattice-based signatures with tight adaptive corruptions and more J Pan, B Wagner IACR International Conference on Public-Key Cryptography, 347-378, 2022 | 16 | 2022 |
Rai-choo! Evolving blind signatures to the next level L Hanzlik, J Loss, B Wagner Annual International Conference on the Theory and Applications of …, 2023 | 13 | 2023 |
Short identity-based signatures with tight security from lattices J Pan, B Wagner Post-Quantum Cryptography: 12th International Workshop, PQCrypto 2021 …, 2021 | 9 | 2021 |
Foundations of data availability sampling M Hall-Andersen, M Simkin, B Wagner Cryptology ePrint Archive, 2023 | 8 | 2023 |
Sweep-uc: Swapping coins privately L Hanzlik, J Loss, SAK Thyagarajan, B Wagner CISPA, 2024 | 4 | 2024 |
Toothpicks: More efficient fork-free two-round multi-signatures J Pan, B Wagner Annual International Conference on the Theory and Applications of …, 2024 | 4 | 2024 |
Twinkle: Threshold signatures from DDH with full adaptive security R Bacho, J Loss, S Tessaro, B Wagner, C Zhu Annual International Conference on the Theory and Applications of …, 2024 | 4 | 2024 |
Lattice-based authenticated key exchange with tight security J Pan, B Wagner, R Zeng Annual International Cryptology Conference, 616-647, 2023 | 3 | 2023 |
Tighter security for generic authenticated key exchange in the QROM J Pan, B Wagner, R Zeng International Conference on the Theory and Application of Cryptology and …, 2023 | 2 | 2023 |
FIDO2 With Two Displays-Or How to Protect Security-Critical Web Transactions Against Malware Attacks T Hackenjos, B Wagner, J Herr, J Rill, M Wehmer, N Goerke, I Baumgart arXiv preprint arXiv:2206.13358, 2022 | 2 | 2022 |
PI-Cut-Choo! Parallel Instance Cut and Choose for Practical Blind Signatures. B Wagner, L Hanzlik, J Loss CISPA, 2022 | 2 | 2022 |
A holistic security analysis of monero transactions C Cremers, J Loss, B Wagner Annual International Conference on the Theory and Applications of …, 2024 | 1 | 2024 |
Kleptographic Attacks against Implicit Rejection. A Joux, J Loss, B Wagner CISPA, 2024 | 1 | 2024 |
FRIDA: Data Availability Sampling from FRI M Hall-Andersen, M Simkin, B Wagner Cryptology ePrint Archive, 2024 | 1 | 2024 |
Jackpot: Non-Interactive Aggregatable Lotteries N Fleischhacker, M Hall-Andersen, M Simkin, B Wagner Cryptology ePrint Archive, 2023 | 1 | 2023 |
Techniques for highly efficient and secure interactive signatures BLU Wagner Saarländische Universitäts-und Landesbibliothek, 2024 | | 2024 |
Sublinear-Round Broadcast without Trusted Setup AB Alexandru, J Loss, C Papamanthou, G Tsimos, B Wagner Cryptology ePrint Archive, 2024 | | 2024 |